Vulnerability Details : CVE-2025-21919
In the Linux kernel, the following vulnerability has been resolved:
sched/fair: Fix potential memory corruption in child_cfs_rq_on_list
child_cfs_rq_on_list attempts to convert a 'prev' pointer to a cfs_rq.
This 'prev' pointer can originate from struct rq's leaf_cfs_rq_list,
making the conversion invalid and potentially leading to memory
corruption. Depending on the relative positions of leaf_cfs_rq_list and
the task group (tg) pointer within the struct, this can cause a memory
fault or access garbage data.
The issue arises in list_add_leaf_cfs_rq, where both
cfs_rq->leaf_cfs_rq_list and rq->leaf_cfs_rq_list are added to the same
leaf list. Also, rq->tmp_alone_branch can be set to rq->leaf_cfs_rq_list.
This adds a check `if (prev == &rq->leaf_cfs_rq_list)` after the main
conditional in child_cfs_rq_on_list. This ensures that the container_of
operation will convert a correct cfs_rq struct.
This check is sufficient because only cfs_rqs on the same CPU are added
to the list, so verifying the 'prev' pointer against the current rq's list
head is enough.
Fixes a potential memory corruption issue that due to current struct
layout might not be manifesting as a crash but could lead to unpredictable
behavior when the layout changes.
Vulnerability category: Memory Corruption
Products affected by CVE-2025-21919
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2025-21919
0.02%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 4 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2025-21919
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST | 2025-04-11 |
CWE ids for CVE-2025-21919
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2025-21919
-
https://git.kernel.org/stable/c/b5741e4b9ef3567613b2351384f91d3f16e59986
Patch
-
https://git.kernel.org/stable/c/e1dd09df30ba86716cb2ffab97dc35195c01eb8f
Patch
-
https://git.kernel.org/stable/c/3b4035ddbfc8e4521f85569998a7569668cccf51
Patch
-
https://git.kernel.org/stable/c/9cc7f0018609f75a349e42e3aebc3b0e905ba775
Patch
-
https://git.kernel.org/stable/c/5cb300dcdd27e6a351ac02541e0231261c775852
Patch
-
https://git.kernel.org/stable/c/000c9ee43928f2ce68a156dd40bab7616256f4dd
Patch
Jump to