๐Ÿ” CVE Alert

CVE-2025-21965

UNKNOWN 0.0

sched_ext: Validate prev_cpu in scx_bpf_select_cpu_dfl()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: sched_ext: Validate prev_cpu in scx_bpf_select_cpu_dfl() If a BPF scheduler provides an invalid CPU (outside the nr_cpu_ids range) as prev_cpu to scx_bpf_select_cpu_dfl() it can cause a kernel crash. To prevent this, validate prev_cpu in scx_bpf_select_cpu_dfl() and trigger an scx error if an invalid CPU is specified.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 1, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
f0e1a0643a59bf1f922fa209cec86a170b784f3f < 752b56bb76e2471197d25d6948d85753043b10da f0e1a0643a59bf1f922fa209cec86a170b784f3f < 515680e76c536dd4aa8e2b5d674b0d441baddf5b f0e1a0643a59bf1f922fa209cec86a170b784f3f < 9360dfe4cbd62ff1eb8217b815964931523b75b3
Linux / Linux
6.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/752b56bb76e2471197d25d6948d85753043b10da git.kernel.org: https://git.kernel.org/stable/c/515680e76c536dd4aa8e2b5d674b0d441baddf5b git.kernel.org: https://git.kernel.org/stable/c/9360dfe4cbd62ff1eb8217b815964931523b75b3