CVE-2025-38522

Severity CVSS v4.0:
Pending analysis
Type:
CWE-476 NULL Pointer Dereference
Publication date:
16/08/2025
Last modified:
18/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> sched/ext: Prevent update_locked_rq() calls with NULL rq<br /> <br /> Avoid invoking update_locked_rq() when the runqueue (rq) pointer is NULL<br /> in the SCX_CALL_OP and SCX_CALL_OP_RET macros.<br /> <br /> Previously, calling update_locked_rq(NULL) with preemption enabled could<br /> trigger the following warning:<br /> <br /> BUG: using __this_cpu_write() in preemptible [00000000]<br /> <br /> This happens because __this_cpu_write() is unsafe to use in preemptible<br /> context.<br /> <br /> rq is NULL when an ops invoked from an unlocked context. In such cases, we<br /> don&amp;#39;t need to store any rq, since the value should already be NULL<br /> (unlocked). Ensure that update_locked_rq() is only called when rq is<br /> non-NULL, preventing calling __this_cpu_write() on preemptible context.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.15.1 (including) 6.15.8 (excluding)
cpe:2.3:o:linux:linux_kernel:6.15:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc6:*:*:*:*:*:*