In the Linux kernel, the following vulnerability has been resolved:
sched_ext: Fix possible deadlock in the deferred_irq_workfn()
For PREEMPT_RT=y kernels, the deferred_irq_workfn() is executed in
the per-cpu irq_work/* task context and not disable-irq, if the rq
returned by container_of() is current CPU's rq, the following scenarios
may occur:
lock(&rq->__lock);
<Interrupt>
lock(&rq->__lock);
This commit use IRQ_WORK_INIT_HARD() to replace init_irq_work() to
initialize rq->scx.deferred_irq_work, make the deferred_irq_workfn()
is always invoked in hard-irq context.
References
Configurations
Configuration 1 (hide)
|
History
26 Feb 2026, 15:53
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:6.18:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.18:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.18:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.18:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.18:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.18:rc4:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | CWE-667 | |
| References | () https://git.kernel.org/stable/c/541959b2fadb832a7d0ceb95041dc52bdcf6bff7 - Patch | |
| References | () https://git.kernel.org/stable/c/600b4379b9a7ba41340d652211fb29699da4c629 - Patch | |
| References | () https://git.kernel.org/stable/c/a257e974210320ede524f340ffe16bf4bf0dda1e - Patch | |
| First Time |
Linux
Linux linux Kernel |
30 Jan 2026, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
22 Dec 2025, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-22 17:16
Updated : 2026-02-26 15:53
NVD link : CVE-2025-68333
Mitre link : CVE-2025-68333
CVE.ORG link : CVE-2025-68333
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-667
Improper Locking
