CVE-2025-21657

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/01/2025
Last modified:
15/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> sched_ext: Replace rq_lock() to raw_spin_rq_lock() in scx_ops_bypass()<br /> <br /> scx_ops_bypass() iterates all CPUs to re-enqueue all the scx tasks.<br /> For each CPU, it acquires a lock using rq_lock() regardless of whether<br /> a CPU is offline or the CPU is currently running a task in a higher<br /> scheduler class (e.g., deadline). The rq_lock() is supposed to be used<br /> for online CPUs, and the use of rq_lock() may trigger an unnecessary<br /> warning in rq_pin_lock(). Therefore, replace rq_lock() to<br /> raw_spin_rq_lock() in scx_ops_bypass().<br /> <br /> Without this change, we observe the following warning:<br /> <br /> ===== START =====<br /> [ 6.615205] rq-&gt;balance_callback &amp;&amp; rq-&gt;balance_callback != &amp;balance_push_callback<br /> [ 6.615208] WARNING: CPU: 2 PID: 0 at kernel/sched/sched.h:1730 __schedule+0x1130/0x1c90<br /> ===== END =====

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.12.1 (including) 6.12.10 (excluding)
cpe:2.3:o:linux:linux_kernel:6.12:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*