In the Linux kernel, the following vulnerability has been resolved: sched_ext: Validate prev_cpu in scx_bpf_select_cpu_dfl() If a BPF scheduler provides an invalid CPU (outside the nr_cpu_ids range) as prev_cpu to scx_bpf_select_cpu_dfl() it can cause a kernel crash. To prevent this, validate prev_cpu in scx_bpf_select_cpu_dfl() and trigger an scx error if an invalid CPU is specified.
2025-04-01T16:15:27.767
2025-10-31T19:35:16.713
Analyzed
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSSv3.1: 5.5 (MEDIUM)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | linux | linux_kernel | < 6.12.20 | Yes |
| Operating System | linux | linux_kernel | < 6.13.8 | Yes |
| Operating System | linux | linux_kernel | 6.14 | Yes |
| Operating System | linux | linux_kernel | 6.14 | Yes |
| Operating System | linux | linux_kernel | 6.14 | Yes |
| Operating System | linux | linux_kernel | 6.14 | Yes |
| Operating System | linux | linux_kernel | 6.14 | Yes |
| Operating System | linux | linux_kernel | 6.14 | Yes |