๐Ÿ” CVE Alert

CVE-2025-38012

UNKNOWN 0.0

sched_ext: bpf_iter_scx_dsq_new() should always initialize iterator

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: sched_ext: bpf_iter_scx_dsq_new() should always initialize iterator BPF programs may call next() and destroy() on BPF iterators even after new() returns an error value (e.g. bpf_for_each() macro ignores error returns from new()). bpf_iter_scx_dsq_new() could leave the iterator in an uninitialized state after an error return causing bpf_iter_scx_dsq_next() to dereference garbage data. Make bpf_iter_scx_dsq_new() always clear $kit->dsq so that next() and destroy() become noops.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jun 18, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
650ba21b131ed1f8ee57826b2c6295a3be221132 < 0102989af4c334d1d98b2a0fd4d61a5152e39b72 650ba21b131ed1f8ee57826b2c6295a3be221132 < 255dd31bfc4a67a19b1fc2cd130a50284dadfe3a 650ba21b131ed1f8ee57826b2c6295a3be221132 < 428dc9fc0873989d73918d4a9cc22745b7bbc799
Linux / Linux
6.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/0102989af4c334d1d98b2a0fd4d61a5152e39b72 git.kernel.org: https://git.kernel.org/stable/c/255dd31bfc4a67a19b1fc2cd130a50284dadfe3a git.kernel.org: https://git.kernel.org/stable/c/428dc9fc0873989d73918d4a9cc22745b7bbc799