In the Linux kernel, the following vulnerability has been resolved:
sched/eevdf: Fix se->slice being set to U64_MAX and resulting crash
There is a code path in dequeueentities() that can set the slice of a schedentity to U64_MAX, which sometimes results in a crash.
The offending case is when dequeue_entities() is called to dequeue a delayed group entity, and then the entity's parent's dequeue is delayed. In that case:
This throws off subsequent calculations with potentially catastrophic results. A manifestation we saw in production was:
Dumping the cfsrq states from the core dumps with drgn showed tell-tale huge vruntime ranges and bogus vlag values, and I also traced se->slice being set to U64MAX on live systems (which was usually "benign" since the rest of the runqueue needed to be in a particular state to crash).
Fix it in dequeueentities() by always setting slice from the first non-empty cfsrq.
[
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "kernel/sched/fair.c"
},
"digest": {
"line_hashes": [
"254812602774900030681634740919117216862",
"46661204985432113856713005410586128974",
"100663824139019303145830991877082545680",
"18719678288745176932705292169155602718",
"228023440167149905752488831574382491530",
"156945693167515091309085832855911756898",
"35900549834265057296833847151734878182",
"168917490670314715908908945168607964416",
"20925002276611866394134364838331196919"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bbce3de72be56e4b5f68924b7da9630cc89aa1a8",
"signature_version": "v1",
"id": "CVE-2025-37821-44b4658d"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "kernel/sched/fair.c",
"function": "dequeue_entities"
},
"digest": {
"length": 1762.0,
"function_hash": "125726233019184832885931191188426564947"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@86b37810fa1e40b93171da023070b99ccbb4ea04",
"signature_version": "v1",
"id": "CVE-2025-37821-68e60693"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "kernel/sched/fair.c"
},
"digest": {
"line_hashes": [
"149061015002992491603514491662611307528",
"246727224363075794728142365268250194459",
"243304741434649341661665589190206196400",
"18719678288745176932705292169155602718",
"228023440167149905752488831574382491530",
"156945693167515091309085832855911756898",
"35900549834265057296833847151734878182",
"168917490670314715908908945168607964416",
"11973284306858098222011192478283110134"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@86b37810fa1e40b93171da023070b99ccbb4ea04",
"signature_version": "v1",
"id": "CVE-2025-37821-8fb34649"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "kernel/sched/fair.c"
},
"digest": {
"line_hashes": [
"254812602774900030681634740919117216862",
"46661204985432113856713005410586128974",
"100663824139019303145830991877082545680",
"18719678288745176932705292169155602718",
"228023440167149905752488831574382491530",
"156945693167515091309085832855911756898",
"35900549834265057296833847151734878182",
"168917490670314715908908945168607964416",
"20925002276611866394134364838331196919"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@50a665496881262519f115f1bfe5822f30580eb0",
"signature_version": "v1",
"id": "CVE-2025-37821-9125d7b0"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "kernel/sched/fair.c",
"function": "dequeue_entities"
},
"digest": {
"length": 1761.0,
"function_hash": "143585755216910096424738967461548717356"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bbce3de72be56e4b5f68924b7da9630cc89aa1a8",
"signature_version": "v1",
"id": "CVE-2025-37821-9f2405f0"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "kernel/sched/fair.c",
"function": "dequeue_entities"
},
"digest": {
"length": 1761.0,
"function_hash": "143585755216910096424738967461548717356"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@50a665496881262519f115f1bfe5822f30580eb0",
"signature_version": "v1",
"id": "CVE-2025-37821-cf4ca97a"
}
]