Home

Description

In the Linux kernel, the following vulnerability has been resolved: sched_ext: Fix possible deadlock in the deferred_irq_workfn() For PREEMPT_RT=y kernels, the deferred_irq_workfn() is executed in the per-cpu irq_work/* task context and not disable-irq, if the rq returned by container_of() is current CPU's rq, the following scenarios may occur: lock(&rq->__lock); <Interrupt> lock(&rq->__lock); This commit use IRQ_WORK_INIT_HARD() to replace init_irq_work() to initialize rq->scx.deferred_irq_work, make the deferred_irq_workfn() is always invoked in hard-irq context.

PUBLISHED Reserved 2025-12-16 | Published 2025-12-22 | Updated 2025-12-22 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 600b4379b9a7ba41340d652211fb29699da4c629
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before a257e974210320ede524f340ffe16bf4bf0dda1e
affected

Default status
affected

6.17.12 (semver)
unaffected

6.18 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/600b4379b9a7ba41340d652211fb29699da4c629

git.kernel.org/...c/a257e974210320ede524f340ffe16bf4bf0dda1e

cve.org (CVE-2025-68333)

nvd.nist.gov (CVE-2025-68333)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.