Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Power Of The Intl API: A Definitive Guide To Browser-Native Internationalization

      August 8, 2025

      This week in AI dev tools: GPT-5, Claude Opus 4.1, and more (August 8, 2025)

      August 8, 2025

      Elastic simplifies log analytics for SREs and developers with launch of Log Essentials

      August 7, 2025

      OpenAI launches GPT-5

      August 7, 2025

      5 ways business leaders can transform workplace culture – and it starts by listening

      August 8, 2025

      My 4 favorite image editing apps on Linux – and two are free Photoshop alternatives

      August 8, 2025

      How Google’s Genie 3 could change AI video – and let you build your own interactive worlds

      August 8, 2025

      How you’re charging your tablet is slowly killing it – 3 methods to avoid (and the right way)

      August 8, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Establishing Consistent Data Foundations with Laravel’s Database Population System

      August 8, 2025
      Recent

      Establishing Consistent Data Foundations with Laravel’s Database Population System

      August 8, 2025

      Generate Postman Collections from Laravel Routes

      August 8, 2025

      This Week in Laravel: Free Laravel Idea, Laracon News, and More

      August 8, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Lenovo Legion Go 2 vs Legion Go — How Do These Gaming Handhelds Compare Based on Rumored Specs?

      August 8, 2025
      Recent

      Lenovo Legion Go 2 vs Legion Go — How Do These Gaming Handhelds Compare Based on Rumored Specs?

      August 8, 2025

      9 Default Settings in Windows 11 You Didn’t Know Could Affect Performance and Privacy

      August 8, 2025

      DICE Responds to Battlefield 6 Community: Key Updates on Map Flow and Class Mechanics

      August 8, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-37821 – Linux Kernel Sched Eevdf Crash

    CVE-2025-37821 – Linux Kernel Sched Eevdf Crash

    May 8, 2025

    CVE ID : CVE-2025-37821

    Published : May 8, 2025, 7:15 a.m. | 58 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    sched/eevdf: Fix se->slice being set to U64_MAX and resulting crash

    There is a code path in dequeue_entities() that can set the slice of a
    sched_entity to U64_MAX, which sometimes results in a crash.

    The offending case is when dequeue_entities() is called to dequeue a
    delayed group entity, and then the entity’s parent’s dequeue is delayed.
    In that case:

    1. In the if (entity_is_task(se)) else block at the beginning of
    dequeue_entities(), slice is set to
    cfs_rq_min_slice(group_cfs_rq(se)). If the entity was delayed, then
    it has no queued tasks, so cfs_rq_min_slice() returns U64_MAX.
    2. The first for_each_sched_entity() loop dequeues the entity.
    3. If the entity was its parent’s only child, then the next iteration
    tries to dequeue the parent.
    4. If the parent’s dequeue needs to be delayed, then it breaks from the
    first for_each_sched_entity() loop _without updating slice_.
    5. The second for_each_sched_entity() loop sets the parent’s ->slice to
    the saved slice, which is still U64_MAX.

    This throws off subsequent calculations with potentially catastrophic
    results. A manifestation we saw in production was:

    6. In update_entity_lag(), se->slice is used to calculate limit, which
    ends up as a huge negative number.
    7. limit is used in se->vlag = clamp(vlag, -limit, limit). Because limit
    is negative, vlag > limit, so se->vlag is set to the same huge
    negative number.
    8. In place_entity(), se->vlag is scaled, which overflows and results in
    another huge (positive or negative) number.
    9. The adjusted lag is subtracted from se->vruntime, which increases or
    decreases se->vruntime by a huge number.
    10. pick_eevdf() calls entity_eligible()/vruntime_eligible(), which
    incorrectly returns false because the vruntime is so far from the
    other vruntimes on the queue, causing the
    (vruntime – cfs_rq->min_vruntime) * load calulation to overflow.
    11. Nothing appears to be eligible, so pick_eevdf() returns NULL.
    12. pick_next_entity() tries to dereference the return value of
    pick_eevdf() and crashes.

    Dumping the cfs_rq states from the core dumps with drgn showed tell-tale
    huge vruntime ranges and bogus vlag values, and I also traced se->slice
    being set to U64_MAX on live systems (which was usually “benign” since
    the rest of the runqueue needed to be in a particular state to crash).

    Fix it in dequeue_entities() by always setting slice from the first
    non-empty cfs_rq.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-37827 – Here is a title for the vulnerability:“btrfs: RAID1 Profile Write Pointer Offset Mismatch NULL Pointer Dereference”
    Next Article CVE-2025-37826 – Linux Kernel UFS SCSI Null Pointer Dereference Vulnerability

    Related Posts

    Development

    Black Hat USA 2025: Does successful cybersecurity today increase cyber-risk tomorrow?

    August 8, 2025
    Development

    Black Hat USA 2025: Policy compliance and the myth of the silver bullet

    August 8, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-7756 – Code-Projects E-Commerce Site Cross-Site Request Forgery Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    AI in Finance: Transforming Investments and Banking in the Digital Age

    Development

    CVE-2025-5131 – Tmall Demo Unrestricted File Upload Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Distribution Release: OpenMandriva Lx 6.0

    News & Updates

    Highlights

    CVE-2025-5172 – Econtrata SQL Injection Vulnerability

    May 26, 2025

    CVE ID : CVE-2025-5172

    Published : May 26, 2025, 6:17 a.m. | 2 hours, 55 minutes ago

    Description : A vulnerability, which was classified as critical, was found in Econtrata up to 20250516. Affected is an unknown function of the file /valida. The manipulation of the argument usuario leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

    Severity: 7.3 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    HazyBeacon: Novel Backdoor Uses AWS Lambda for Stealthy C2, Targets Govts

    July 15, 2025

    Xreal wants you to split with your Meta Ray-Ban specs – here’s how with this trade-in deal

    August 1, 2025

    CVE-2025-5270 – “Firefox SSL/TLS Man-in-the-Middle Vulnerability”

    May 27, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.