CVE-2026-43323 (GCVE-0-2026-43323)
Vulnerability from cvelistv5 – Published: 2026-05-08 13:31 – Updated: 2026-05-08 13:31
VLAI?
Title
sched/fair: Fix zero_vruntime tracking fix
Summary
In the Linux kernel, the following vulnerability has been resolved:
sched/fair: Fix zero_vruntime tracking fix
John reported that stress-ng-yield could make his machine unhappy and
managed to bisect it to commit b3d99f43c72b ("sched/fair: Fix
zero_vruntime tracking").
The combination of yield and that commit was specific enough to
hypothesize the following scenario:
Suppose we have 2 runnable tasks, both doing yield. Then one will be
eligible and one will not be, because the average position must be in
between these two entities.
Therefore, the runnable task will be eligible, and be promoted a full
slice (all the tasks do is yield after all). This causes it to jump over
the other task and now the other task is eligible and current is no
longer. So we schedule.
Since we are runnable, there is no {de,en}queue. All we have is the
__{en,de}queue_entity() from {put_prev,set_next}_task(). But per the
fingered commit, those two no longer move zero_vruntime.
All that moves zero_vruntime are tick and full {de,en}queue.
This means, that if the two tasks playing leapfrog can reach the
critical speed to reach the overflow point inside one tick's worth of
time, we're up a creek.
Additionally, when multiple cgroups are involved, there is no guarantee
the tick will in fact hit every cgroup in a timely manner. Statistically
speaking it will, but that same statistics does not rule out the
possibility of one cgroup not getting a tick for a significant amount of
time -- however unlikely.
Therefore, just like with the yield() case, force an update at the end
of every slice. This ensures the update is never more than a single
slice behind and the whole thing is within 2 lag bounds as per the
comment on entity_key().
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
d2fc2dcfce47a56ffd414783003cc966c742c8a9 , < c089147074ed96ff4330739a0559394c19a3dfc8
(git)
Affected: 99673934a89febe664e704550216638dcb2336a8 , < 87573883c30f1a8555ff720836bb6ea231058539 (git) Affected: 978d4fe59665c13db692ba96839f9c52d69f13f3 , < fb61ffb3fb30a161eb5404c27fc7635e275beafd (git) Affected: b3d99f43c72b56cf7a104a364e7fb34b0702828b , < 1319ea57529e131822bab56bf417c8edc2db9ae8 (git) |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"kernel/sched/fair.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "c089147074ed96ff4330739a0559394c19a3dfc8",
"status": "affected",
"version": "d2fc2dcfce47a56ffd414783003cc966c742c8a9",
"versionType": "git"
},
{
"lessThan": "87573883c30f1a8555ff720836bb6ea231058539",
"status": "affected",
"version": "99673934a89febe664e704550216638dcb2336a8",
"versionType": "git"
},
{
"lessThan": "fb61ffb3fb30a161eb5404c27fc7635e275beafd",
"status": "affected",
"version": "978d4fe59665c13db692ba96839f9c52d69f13f3",
"versionType": "git"
},
{
"lessThan": "1319ea57529e131822bab56bf417c8edc2db9ae8",
"status": "affected",
"version": "b3d99f43c72b56cf7a104a364e7fb34b0702828b",
"versionType": "git"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"kernel/sched/fair.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "6.12.81",
"status": "affected",
"version": "6.12.78",
"versionType": "semver"
},
{
"lessThan": "6.18.22",
"status": "affected",
"version": "6.18.17",
"versionType": "semver"
},
{
"lessThan": "6.19.12",
"status": "affected",
"version": "6.19.7",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.81",
"versionStartIncluding": "6.12.78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18.22",
"versionStartIncluding": "6.18.17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.19.12",
"versionStartIncluding": "6.19.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/fair: Fix zero_vruntime tracking fix\n\nJohn reported that stress-ng-yield could make his machine unhappy and\nmanaged to bisect it to commit b3d99f43c72b (\"sched/fair: Fix\nzero_vruntime tracking\").\n\nThe combination of yield and that commit was specific enough to\nhypothesize the following scenario:\n\nSuppose we have 2 runnable tasks, both doing yield. Then one will be\neligible and one will not be, because the average position must be in\nbetween these two entities.\n\nTherefore, the runnable task will be eligible, and be promoted a full\nslice (all the tasks do is yield after all). This causes it to jump over\nthe other task and now the other task is eligible and current is no\nlonger. So we schedule.\n\nSince we are runnable, there is no {de,en}queue. All we have is the\n__{en,de}queue_entity() from {put_prev,set_next}_task(). But per the\nfingered commit, those two no longer move zero_vruntime.\n\nAll that moves zero_vruntime are tick and full {de,en}queue.\n\nThis means, that if the two tasks playing leapfrog can reach the\ncritical speed to reach the overflow point inside one tick\u0027s worth of\ntime, we\u0027re up a creek.\n\nAdditionally, when multiple cgroups are involved, there is no guarantee\nthe tick will in fact hit every cgroup in a timely manner. Statistically\nspeaking it will, but that same statistics does not rule out the\npossibility of one cgroup not getting a tick for a significant amount of\ntime -- however unlikely.\n\nTherefore, just like with the yield() case, force an update at the end\nof every slice. This ensures the update is never more than a single\nslice behind and the whole thing is within 2 lag bounds as per the\ncomment on entity_key()."
}
],
"providerMetadata": {
"dateUpdated": "2026-05-08T13:31:08.188Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/c089147074ed96ff4330739a0559394c19a3dfc8"
},
{
"url": "https://git.kernel.org/stable/c/87573883c30f1a8555ff720836bb6ea231058539"
},
{
"url": "https://git.kernel.org/stable/c/fb61ffb3fb30a161eb5404c27fc7635e275beafd"
},
{
"url": "https://git.kernel.org/stable/c/1319ea57529e131822bab56bf417c8edc2db9ae8"
}
],
"title": "sched/fair: Fix zero_vruntime tracking fix",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2026-43323",
"datePublished": "2026-05-08T13:31:08.188Z",
"dateReserved": "2026-05-01T14:12:56.001Z",
"dateUpdated": "2026-05-08T13:31:08.188Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2026-43323\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-05-08T14:16:40.947\",\"lastModified\":\"2026-05-08T14:16:40.947\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nsched/fair: Fix zero_vruntime tracking fix\\n\\nJohn reported that stress-ng-yield could make his machine unhappy and\\nmanaged to bisect it to commit b3d99f43c72b (\\\"sched/fair: Fix\\nzero_vruntime tracking\\\").\\n\\nThe combination of yield and that commit was specific enough to\\nhypothesize the following scenario:\\n\\nSuppose we have 2 runnable tasks, both doing yield. Then one will be\\neligible and one will not be, because the average position must be in\\nbetween these two entities.\\n\\nTherefore, the runnable task will be eligible, and be promoted a full\\nslice (all the tasks do is yield after all). This causes it to jump over\\nthe other task and now the other task is eligible and current is no\\nlonger. So we schedule.\\n\\nSince we are runnable, there is no {de,en}queue. All we have is the\\n__{en,de}queue_entity() from {put_prev,set_next}_task(). But per the\\nfingered commit, those two no longer move zero_vruntime.\\n\\nAll that moves zero_vruntime are tick and full {de,en}queue.\\n\\nThis means, that if the two tasks playing leapfrog can reach the\\ncritical speed to reach the overflow point inside one tick\u0027s worth of\\ntime, we\u0027re up a creek.\\n\\nAdditionally, when multiple cgroups are involved, there is no guarantee\\nthe tick will in fact hit every cgroup in a timely manner. Statistically\\nspeaking it will, but that same statistics does not rule out the\\npossibility of one cgroup not getting a tick for a significant amount of\\ntime -- however unlikely.\\n\\nTherefore, just like with the yield() case, force an update at the end\\nof every slice. This ensures the update is never more than a single\\nslice behind and the whole thing is within 2 lag bounds as per the\\ncomment on entity_key().\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1319ea57529e131822bab56bf417c8edc2db9ae8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/87573883c30f1a8555ff720836bb6ea231058539\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c089147074ed96ff4330739a0559394c19a3dfc8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/fb61ffb3fb30a161eb5404c27fc7635e275beafd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…