CVE-2025-38522

5.5 MEDIUM

📋 TL;DR

A NULL pointer dereference vulnerability in the Linux kernel's scheduler extension (SCX) subsystem could cause a kernel warning or system instability when certain scheduler operations are called from unlocked contexts. This affects Linux systems using the sched_ext scheduler extension feature. The vulnerability requires local access to trigger.

💻 Affected Systems

Products:
  • Linux Kernel
Versions: Linux kernel versions with sched_ext support before the fix commits 237c43037b336e36a49eb9f2daac1c7719ec7f8b and e14fd98c6d66cb76694b12c05768e4f9e8c95664
Operating Systems: Linux distributions with vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if sched_ext scheduler extensions are enabled and being used. Most standard Linux installations do not use sched_ext by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic or system crash leading to denial of service, potentially disrupting critical services on affected systems.

🟠

Likely Case

Kernel warning message in system logs and minor system instability, but unlikely to cause full system crashes in most scenarios.

🟢

If Mitigated

No impact if the system is not using sched_ext scheduler extensions or has proper access controls preventing local exploitation.

🌐 Internet-Facing: LOW - Requires local access to trigger, cannot be exploited remotely over the network.
🏢 Internal Only: MEDIUM - Local users or processes could trigger the vulnerability, potentially causing system instability affecting other users and services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and knowledge of how to trigger specific scheduler operations from unlocked contexts. No known public exploits exist.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel with commits 237c43037b336e36a49eb9f2daac1c7719ec7f8b and e14fd98c6d66cb76694b12c05768e4f9e8c95664 applied

Vendor Advisory: https://git.kernel.org/stable/c/237c43037b336e36a49eb9f2daac1c7719ec7f8b

Restart Required: Yes

Instructions:

1. Update to a patched Linux kernel version from your distribution vendor. 2. Reboot the system to load the new kernel. 3. Verify the fix is applied by checking kernel version or commit hash.

🔧 Temporary Workarounds

Disable sched_ext scheduler extensions

Linux

Prevent exploitation by disabling the vulnerable scheduler extension subsystem

echo 'blacklist sched_ext' >> /etc/modprobe.d/blacklist.conf
update-initramfs -u
reboot

🧯 If You Can't Patch

  • Restrict local user access to systems using sched_ext scheduler extensions
  • Implement monitoring for kernel warning messages related to scheduler operations

🔍 How to Verify

Check if Vulnerable:

Check if sched_ext is enabled: 'lsmod | grep sched_ext' and check kernel version against vulnerable versions

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes the fix commits: 'uname -r' and check with distribution vendor for patch status

📡 Detection & Monitoring

Log Indicators:

  • Kernel warning messages containing 'BUG: using __this_cpu_write() in preemptible' or scheduler-related warnings

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("__this_cpu_write" OR "sched_ext" OR "update_locked_rq")

🔗 References

📤 Share & Export