Impact
The flaw occurs in the Linux kernel’s sched_ext module, where a stale direct dispatch state can persist after task enqueue, dequeue, or cancellation. When this state remains set, a subsequent wake‑up invokes scx_bpf_dsq_insert, causing a WARN_ON_ONCE in mark_direct_dispatch. The warning indicates improper internal state tracking but does not directly lead to a crash, data loss, or privilege escalation.
Affected Systems
All Linux kernel builds that lack the recent commit which clears the ddsp_dsq_id flag in all dispatch paths are affected. This includes any distribution or custom kernel that has not integrated the scheduler patch addressing this state clearing bug.
Risk and Exploitability
The CVSS base score is not provided and the EPSS is unavailable, implying the likelihood of active exploitation is uncertain and likely low. The vulnerability is not listed in CISA’s KEV catalog. The primary risk is the recurrence of kernel warnings and potential degradation of scheduler reliability, but it does not appear to expose configuration data, modify privileged code paths, or enable remote code execution.
OpenCVE Enrichment