CVE-2026-43323 (GCVE-0-2026-43323)

Vulnerability from cvelistv5 – Published: 2026-05-08 13:31 – Updated: 2026-05-08 13:31
VLAI?
Title
sched/fair: Fix zero_vruntime tracking fix
Summary
In the Linux kernel, the following vulnerability has been resolved: sched/fair: Fix zero_vruntime tracking fix John reported that stress-ng-yield could make his machine unhappy and managed to bisect it to commit b3d99f43c72b ("sched/fair: Fix zero_vruntime tracking"). The combination of yield and that commit was specific enough to hypothesize the following scenario: Suppose we have 2 runnable tasks, both doing yield. Then one will be eligible and one will not be, because the average position must be in between these two entities. Therefore, the runnable task will be eligible, and be promoted a full slice (all the tasks do is yield after all). This causes it to jump over the other task and now the other task is eligible and current is no longer. So we schedule. Since we are runnable, there is no {de,en}queue. All we have is the __{en,de}queue_entity() from {put_prev,set_next}_task(). But per the fingered commit, those two no longer move zero_vruntime. All that moves zero_vruntime are tick and full {de,en}queue. This means, that if the two tasks playing leapfrog can reach the critical speed to reach the overflow point inside one tick's worth of time, we're up a creek. Additionally, when multiple cgroups are involved, there is no guarantee the tick will in fact hit every cgroup in a timely manner. Statistically speaking it will, but that same statistics does not rule out the possibility of one cgroup not getting a tick for a significant amount of time -- however unlikely. Therefore, just like with the yield() case, force an update at the end of every slice. This ensures the update is never more than a single slice behind and the whole thing is within 2 lag bounds as per the comment on entity_key().
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: d2fc2dcfce47a56ffd414783003cc966c742c8a9 , < c089147074ed96ff4330739a0559394c19a3dfc8 (git)
Affected: 99673934a89febe664e704550216638dcb2336a8 , < 87573883c30f1a8555ff720836bb6ea231058539 (git)
Affected: 978d4fe59665c13db692ba96839f9c52d69f13f3 , < fb61ffb3fb30a161eb5404c27fc7635e275beafd (git)
Affected: b3d99f43c72b56cf7a104a364e7fb34b0702828b , < 1319ea57529e131822bab56bf417c8edc2db9ae8 (git)
Create a notification for this product.
    Linux Linux Affected: 6.12.78 , < 6.12.81 (semver)
Affected: 6.18.17 , < 6.18.22 (semver)
Affected: 6.19.7 , < 6.19.12 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "kernel/sched/fair.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "c089147074ed96ff4330739a0559394c19a3dfc8",
              "status": "affected",
              "version": "d2fc2dcfce47a56ffd414783003cc966c742c8a9",
              "versionType": "git"
            },
            {
              "lessThan": "87573883c30f1a8555ff720836bb6ea231058539",
              "status": "affected",
              "version": "99673934a89febe664e704550216638dcb2336a8",
              "versionType": "git"
            },
            {
              "lessThan": "fb61ffb3fb30a161eb5404c27fc7635e275beafd",
              "status": "affected",
              "version": "978d4fe59665c13db692ba96839f9c52d69f13f3",
              "versionType": "git"
            },
            {
              "lessThan": "1319ea57529e131822bab56bf417c8edc2db9ae8",
              "status": "affected",
              "version": "b3d99f43c72b56cf7a104a364e7fb34b0702828b",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "kernel/sched/fair.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "6.12.81",
              "status": "affected",
              "version": "6.12.78",
              "versionType": "semver"
            },
            {
              "lessThan": "6.18.22",
              "status": "affected",
              "version": "6.18.17",
              "versionType": "semver"
            },
            {
              "lessThan": "6.19.12",
              "status": "affected",
              "version": "6.19.7",
              "versionType": "semver"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.81",
                  "versionStartIncluding": "6.12.78",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.18.22",
                  "versionStartIncluding": "6.18.17",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.19.12",
                  "versionStartIncluding": "6.19.7",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/fair: Fix zero_vruntime tracking fix\n\nJohn reported that stress-ng-yield could make his machine unhappy and\nmanaged to bisect it to commit b3d99f43c72b (\"sched/fair: Fix\nzero_vruntime tracking\").\n\nThe combination of yield and that commit was specific enough to\nhypothesize the following scenario:\n\nSuppose we have 2 runnable tasks, both doing yield. Then one will be\neligible and one will not be, because the average position must be in\nbetween these two entities.\n\nTherefore, the runnable task will be eligible, and be promoted a full\nslice (all the tasks do is yield after all). This causes it to jump over\nthe other task and now the other task is eligible and current is no\nlonger. So we schedule.\n\nSince we are runnable, there is no {de,en}queue. All we have is the\n__{en,de}queue_entity() from {put_prev,set_next}_task(). But per the\nfingered commit, those two no longer move zero_vruntime.\n\nAll that moves zero_vruntime are tick and full {de,en}queue.\n\nThis means, that if the two tasks playing leapfrog can reach the\ncritical speed to reach the overflow point inside one tick\u0027s worth of\ntime, we\u0027re up a creek.\n\nAdditionally, when multiple cgroups are involved, there is no guarantee\nthe tick will in fact hit every cgroup in a timely manner. Statistically\nspeaking it will, but that same statistics does not rule out the\npossibility of one cgroup not getting a tick for a significant amount of\ntime -- however unlikely.\n\nTherefore, just like with the yield() case, force an update at the end\nof every slice. This ensures the update is never more than a single\nslice behind and the whole thing is within 2 lag bounds as per the\ncomment on entity_key()."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-08T13:31:08.188Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/c089147074ed96ff4330739a0559394c19a3dfc8"
        },
        {
          "url": "https://git.kernel.org/stable/c/87573883c30f1a8555ff720836bb6ea231058539"
        },
        {
          "url": "https://git.kernel.org/stable/c/fb61ffb3fb30a161eb5404c27fc7635e275beafd"
        },
        {
          "url": "https://git.kernel.org/stable/c/1319ea57529e131822bab56bf417c8edc2db9ae8"
        }
      ],
      "title": "sched/fair: Fix zero_vruntime tracking fix",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2026-43323",
    "datePublished": "2026-05-08T13:31:08.188Z",
    "dateReserved": "2026-05-01T14:12:56.001Z",
    "dateUpdated": "2026-05-08T13:31:08.188Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2026-43323\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-05-08T14:16:40.947\",\"lastModified\":\"2026-05-08T14:16:40.947\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nsched/fair: Fix zero_vruntime tracking fix\\n\\nJohn reported that stress-ng-yield could make his machine unhappy and\\nmanaged to bisect it to commit b3d99f43c72b (\\\"sched/fair: Fix\\nzero_vruntime tracking\\\").\\n\\nThe combination of yield and that commit was specific enough to\\nhypothesize the following scenario:\\n\\nSuppose we have 2 runnable tasks, both doing yield. Then one will be\\neligible and one will not be, because the average position must be in\\nbetween these two entities.\\n\\nTherefore, the runnable task will be eligible, and be promoted a full\\nslice (all the tasks do is yield after all). This causes it to jump over\\nthe other task and now the other task is eligible and current is no\\nlonger. So we schedule.\\n\\nSince we are runnable, there is no {de,en}queue. All we have is the\\n__{en,de}queue_entity() from {put_prev,set_next}_task(). But per the\\nfingered commit, those two no longer move zero_vruntime.\\n\\nAll that moves zero_vruntime are tick and full {de,en}queue.\\n\\nThis means, that if the two tasks playing leapfrog can reach the\\ncritical speed to reach the overflow point inside one tick\u0027s worth of\\ntime, we\u0027re up a creek.\\n\\nAdditionally, when multiple cgroups are involved, there is no guarantee\\nthe tick will in fact hit every cgroup in a timely manner. Statistically\\nspeaking it will, but that same statistics does not rule out the\\npossibility of one cgroup not getting a tick for a significant amount of\\ntime -- however unlikely.\\n\\nTherefore, just like with the yield() case, force an update at the end\\nof every slice. This ensures the update is never more than a single\\nslice behind and the whole thing is within 2 lag bounds as per the\\ncomment on entity_key().\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1319ea57529e131822bab56bf417c8edc2db9ae8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/87573883c30f1a8555ff720836bb6ea231058539\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c089147074ed96ff4330739a0559394c19a3dfc8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/fb61ffb3fb30a161eb5404c27fc7635e275beafd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…