CVE-2025-38012

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/06/2025
Last modified:
17/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> sched_ext: bpf_iter_scx_dsq_new() should always initialize iterator<br /> <br /> BPF programs may call next() and destroy() on BPF iterators even after new()<br /> returns an error value (e.g. bpf_for_each() macro ignores error returns from<br /> new()). bpf_iter_scx_dsq_new() could leave the iterator in an uninitialized<br /> state after an error return causing bpf_iter_scx_dsq_next() to dereference<br /> garbage data. Make bpf_iter_scx_dsq_new() always clear $kit-&gt;dsq so that<br /> next() and destroy() become noops.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.12 (including) 6.12.30 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.14.8 (excluding)
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc6:*:*:*:*:*:*