CVE-2025-39780
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-11

Last updated on: 2025-11-25

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: sched/ext: Fix invalid task state transitions on class switch When enabling a sched_ext scheduler, we may trigger invalid task state transitions, resulting in warnings like the following (which can be easily reproduced by running the hotplug selftest in a loop): sched_ext: Invalid task state transition 0 -> 3 for fish[770] WARNING: CPU: 18 PID: 787 at kernel/sched/ext.c:3862 scx_set_task_state+0x7c/0xc0 ... RIP: 0010:scx_set_task_state+0x7c/0xc0 ... Call Trace: <TASK> scx_enable_task+0x11f/0x2e0 switching_to_scx+0x24/0x110 scx_enable.isra.0+0xd14/0x13d0 bpf_struct_ops_link_create+0x136/0x1a0 __sys_bpf+0x1edd/0x2c30 __x64_sys_bpf+0x21/0x30 do_syscall_64+0xbb/0x370 entry_SYSCALL_64_after_hwframe+0x77/0x7f This happens because we skip initialization for tasks that are already dead (with their usage counter set to zero), but we don't exclude them during the scheduling class transition phase. Fix this by also skipping dead tasks during class swiching, preventing invalid task state transitions.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-11
Last Modified
2025-11-25
Generated
2026-05-07
AI Q&A
2025-09-11
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
linux linux_kernel From 5.15.160 (inc) to 5.16 (inc)
linux linux_kernel 6.17
linux linux_kernel 6.17
linux linux_kernel From 5.15.160 (inc) to 5.16 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-NVD-CWE-noinfo
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the Linux kernel's sched_ext scheduler causes invalid task state transitions during scheduling class switches. Specifically, tasks that are already dead (with usage counters at zero) are not properly excluded during the class switching phase, leading to warnings and potential instability. The issue arises because initialization is skipped for dead tasks, but they are not excluded during the transition, causing invalid state changes. The fix involves skipping dead tasks during class switching to prevent these invalid transitions.


How can this vulnerability impact me? :

This vulnerability can cause invalid task state transitions in the Linux kernel scheduler, which may lead to kernel warnings and potentially unstable or unpredictable system behavior when using the sched_ext scheduler. This could affect system reliability and performance, especially under workloads that trigger these transitions frequently.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring kernel warning messages related to invalid task state transitions when using the sched_ext scheduler. Specifically, look for warnings like: 'sched_ext: Invalid task state transition 0 -> 3 for fish[PID]' in the kernel logs. You can check for these messages using the command: dmesg | grep 'sched_ext: Invalid task state transition'. Running the hotplug selftest in a loop may reproduce the issue and help detect it.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation involves avoiding enabling the sched_ext scheduler until the fix is applied, as the vulnerability occurs during sched_ext scheduler usage. Applying the kernel patch that fixes the invalid task state transitions by skipping dead tasks during class switching is necessary to fully resolve the issue.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart