CVE-2025-21965
01.04.2025, 16:15
In the Linux kernel, the following vulnerability has been resolved: sched_ext: Validate prev_cpu in scx_bpf_select_cpu_dfl() If a BPF scheduler provides an invalid CPU (outside the nr_cpu_ids range) as prev_cpu to scx_bpf_select_cpu_dfl() it can cause a kernel crash. To prevent this, validate prev_cpu in scx_bpf_select_cpu_dfl() and trigger an scx error if an invalid CPU is specified.Enginsight
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 6.12 ≤ 𝑥 < 6.12.20 |
| linux | linux_kernel | 6.13 ≤ 𝑥 < 6.13.8 |
| linux | linux_kernel | 6.14:rc1 |
| linux | linux_kernel | 6.14:rc2 |
| linux | linux_kernel | 6.14:rc3 |
| linux | linux_kernel | 6.14:rc4 |
| linux | linux_kernel | 6.14:rc5 |
| linux | linux_kernel | 6.14:rc6 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration