CVE-2026-43323
Kernel Zero-Vruntime Tracking Race Condition
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is related to the Linux kernel's scheduler, specifically the fair scheduling mechanism. A fix was made to the zero_vruntime tracking, which is a value used to track how much CPU time tasks have received.
The issue occurs when two runnable tasks both repeatedly call yield(), causing them to leapfrog each other in scheduling. Because of how zero_vruntime is updated only on ticks and full enqueue/dequeue operations, it can fail to update correctly if tasks switch rapidly within one tick.
This can lead to one task being promoted a full time slice repeatedly, jumping over the other task, and potentially causing scheduling anomalies. When multiple control groups (cgroups) are involved, some groups might not get scheduled ticks in a timely manner, worsening the problem.
The fix forces an update of zero_vruntime at the end of every scheduling slice to ensure the scheduler's timing remains accurate and no task or cgroup is unfairly delayed.
How can this vulnerability impact me? :
This vulnerability can cause unfair scheduling behavior in the Linux kernel, where some tasks may be promoted repeatedly while others are delayed.
In practical terms, this could lead to performance issues, such as certain processes not getting CPU time as expected, which might degrade system responsiveness or cause delays in task execution.
In environments using multiple cgroups, some groups might experience significant delays in scheduling, potentially impacting workload isolation and fairness.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved in the Linux kernel by fixing the zero_vruntime tracking in the scheduler's fair scheduling code.
To mitigate this vulnerability, you should update your Linux kernel to a version that includes the fix for the zero_vruntime tracking issue (commit b3d99f43c72b or later).