In the Linux kernel, the following vulnerability has been resolved: sched/fair: Fix NEXT_BUDDY Adam reports that enabling NEXT_BUDDY insta triggers a WARN in pick_next_entity(). Moving clear_buddies() up before the delayed dequeue bits ensures no ->next buddy becomes delayed. Further ensure no new ->next buddy ever starts as delayed.
https://git.kernel.org/stable/c/5dbe6816c49197677a5ecce749bd99929da147da
https://git.kernel.org/stable/c/493afbd187c4c9cc1642792c0d9ba400c3d6d90d