CVE-2025-21657
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/01/2025
Last modified:
15/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
sched_ext: Replace rq_lock() to raw_spin_rq_lock() in scx_ops_bypass()<br />
<br />
scx_ops_bypass() iterates all CPUs to re-enqueue all the scx tasks.<br />
For each CPU, it acquires a lock using rq_lock() regardless of whether<br />
a CPU is offline or the CPU is currently running a task in a higher<br />
scheduler class (e.g., deadline). The rq_lock() is supposed to be used<br />
for online CPUs, and the use of rq_lock() may trigger an unnecessary<br />
warning in rq_pin_lock(). Therefore, replace rq_lock() to<br />
raw_spin_rq_lock() in scx_ops_bypass().<br />
<br />
Without this change, we observe the following warning:<br />
<br />
===== START =====<br />
[ 6.615205] rq->balance_callback && rq->balance_callback != &balance_push_callback<br />
[ 6.615208] WARNING: CPU: 2 PID: 0 at kernel/sched/sched.h:1730 __schedule+0x1130/0x1c90<br />
===== END =====
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12.1 (including) | 6.12.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.12:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



