CVE-2026-31734
Race Condition in Linux Kernel sched_ext Component
Publication date: 2026-05-01
Last updated on: 2026-05-01
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
The vulnerability could lead to a migration-disabled task being dispatched to a remote CPU incorrectly, which may cause errors in task scheduling within the Linux kernel. This could potentially affect system stability or performance by triggering unexpected errors in task migration handling.
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's scheduler extension related to BPF (Berkeley Packet Filter) program migration handling. Specifically, a function called is_bpf_migration_disabled() had a false negative when the kernel was configured without PREEMPT_RCU. This caused the system to incorrectly allow a migration-disabled task to be dispatched to a remote CPU, which could trigger an error (scx_error) in the function task_can_run_on_remote_rq(). The fix ensures that the check for whether a task is migration-disabled is correctly applied only when PREEMPT_RCU is enabled, preventing this incorrect dispatch.