DEBIAN-CVE-2025-40260

Source
https://security-tracker.debian.org/tracker/CVE-2025-40260
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-40260.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2025-40260
Upstream
Published
2025-12-04T16:16:19.927Z
Modified
2025-12-14T04:01:11.766448Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: schedext: Fix scxenable() crash on helper kthread creation failure A crash was observed when the schedext selftests runner was terminated with Ctrl+\ while test 15 was running: NIP [c00000000028fa58] scxenable.constprop.0+0x358/0x12b0 LR [c00000000028fa2c] scxenable.constprop.0+0x32c/0x12b0 Call Trace: scxenable.constprop.0+0x32c/0x12b0 (unreliable) bpfstructopslinkcreate+0x18c/0x22c _sysbpf+0x23f8/0x3044 sysbpf+0x2c/0x6c systemcallexception+0x124/0x320 systemcallvectoredcommon+0x15c/0x2ec kthreadrunworker() returns an ERRPTR() on failure rather than NULL, but the current code in scxallocandaddsched() only checks for a NULL helper. Incase of failure on SIGQUIT, the error is not handled in scxallocandaddsched() and scxenable() ends up dereferencing an error pointer. Error handling is fixed in scxallocandaddsched() to propagate PTRERR() into ret, so that scxenable() jumps to the existing error path, avoiding random dereference on failure.

References

Affected packages

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.17.10-1

Affected versions

6.*
6.12.38-1
6.12.41-1
6.12.43-1~bpo12+1
6.12.43-1
6.12.48-1
6.12.57-1~bpo12+1
6.12.57-1
6.12.63-1~bpo12+1
6.12.63-1
6.12.69-1~bpo12+1
6.12.69-1
6.12.73-1~bpo12+1
6.12.73-1
6.13~rc6-1~exp1
6.13~rc7-1~exp1
6.13.2-1~exp1
6.13.3-1~exp1
6.13.4-1~exp1
6.13.5-1~exp1
6.13.6-1~exp1
6.13.7-1~exp1
6.13.8-1~exp1
6.13.9-1~exp1
6.13.10-1~exp1
6.13.11-1~exp1
6.14.3-1~exp1
6.14.5-1~exp1
6.14.6-1~exp1
6.15~rc7-1~exp1
6.15-1~exp1
6.15.1-1~exp1
6.15.2-1~exp1
6.15.3-1~exp1
6.15.4-1~exp1
6.15.5-1~exp1
6.15.6-1~exp1
6.16~rc7-1~exp1
6.16-1~exp1
6.16.1-1~exp1
6.16.3-1~bpo13+1
6.16.3-1
6.16.5-1
6.16.6-1
6.16.7-1
6.16.8-1
6.16.9-1
6.16.10-1
6.16.11-1
6.16.12-1~bpo13+1
6.16.12-1
6.16.12-2
6.17.2-1~exp1
6.17.5-1~exp1
6.17.6-1
6.17.7-1
6.17.7-2
6.17.8-1~bpo13+1
6.17.8-1
6.17.9-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-40260.json"