Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-21919
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-01 Apr, 2025 | 15:40
Updated At-04 May, 2025 | 07:24
Rejected At-
▼CVE Numbering Authority (CNA)
sched/fair: Fix potential memory corruption in child_cfs_rq_on_list

In the Linux kernel, the following vulnerability has been resolved: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list child_cfs_rq_on_list attempts to convert a 'prev' pointer to a cfs_rq. This 'prev' pointer can originate from struct rq's leaf_cfs_rq_list, making the conversion invalid and potentially leading to memory corruption. Depending on the relative positions of leaf_cfs_rq_list and the task group (tg) pointer within the struct, this can cause a memory fault or access garbage data. The issue arises in list_add_leaf_cfs_rq, where both cfs_rq->leaf_cfs_rq_list and rq->leaf_cfs_rq_list are added to the same leaf list. Also, rq->tmp_alone_branch can be set to rq->leaf_cfs_rq_list. This adds a check `if (prev == &rq->leaf_cfs_rq_list)` after the main conditional in child_cfs_rq_on_list. This ensures that the container_of operation will convert a correct cfs_rq struct. This check is sufficient because only cfs_rqs on the same CPU are added to the list, so verifying the 'prev' pointer against the current rq's list head is enough. Fixes a potential memory corruption issue that due to current struct layout might not be manifesting as a crash but could lead to unpredictable behavior when the layout changes.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • kernel/sched/fair.c
Default Status
unaffected
Versions
Affected
  • From fdaba61ef8a268d4136d0a113d153f7a89eb9984 before 5cb300dcdd27e6a351ac02541e0231261c775852 (git)
  • From fdaba61ef8a268d4136d0a113d153f7a89eb9984 before 000c9ee43928f2ce68a156dd40bab7616256f4dd (git)
  • From fdaba61ef8a268d4136d0a113d153f7a89eb9984 before 9cc7f0018609f75a349e42e3aebc3b0e905ba775 (git)
  • From fdaba61ef8a268d4136d0a113d153f7a89eb9984 before b5741e4b9ef3567613b2351384f91d3f16e59986 (git)
  • From fdaba61ef8a268d4136d0a113d153f7a89eb9984 before e1dd09df30ba86716cb2ffab97dc35195c01eb8f (git)
  • From fdaba61ef8a268d4136d0a113d153f7a89eb9984 before 3b4035ddbfc8e4521f85569998a7569668cccf51 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • kernel/sched/fair.c
Default Status
affected
Versions
Affected
  • 5.13
Unaffected
  • From 0 before 5.13 (semver)
  • From 5.15.179 through 5.15.* (semver)
  • From 6.1.131 through 6.1.* (semver)
  • From 6.6.83 through 6.6.* (semver)
  • From 6.12.19 through 6.12.* (semver)
  • From 6.13.7 through 6.13.* (semver)
  • From 6.14 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/5cb300dcdd27e6a351ac02541e0231261c775852
N/A
https://git.kernel.org/stable/c/000c9ee43928f2ce68a156dd40bab7616256f4dd
N/A
https://git.kernel.org/stable/c/9cc7f0018609f75a349e42e3aebc3b0e905ba775
N/A
https://git.kernel.org/stable/c/b5741e4b9ef3567613b2351384f91d3f16e59986
N/A
https://git.kernel.org/stable/c/e1dd09df30ba86716cb2ffab97dc35195c01eb8f
N/A
https://git.kernel.org/stable/c/3b4035ddbfc8e4521f85569998a7569668cccf51
N/A
Details not found