CVE-2026-43417
Linux Kernel Scheduling Loop Vulnerability in mmcid
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved in the Linux kernel by fixing the handling of vfork()/CLONE_VM tasks in the scheduler. To mitigate this vulnerability, you should update your Linux kernel to a version that includes this fix.
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's scheduling code related to handling vfork() and CLONE_VM. Specifically, the logic that manages tasks created by vfork() is broken. When the number of tasks associated with a process is smaller than the number of MMCID users, the kernel attempts to find the vfork()ed task by walking the task list. However, it incorrectly counts already processed tasks, which can cause the walk to stop prematurely without fixing the vfork()ed task's CID (context ID). As a result, when the scheduler tries to schedule in the task, it fails to acquire a necessary transitional CID, causing the machine to stall.
How can this vulnerability impact me? :
The impact of this vulnerability is that the affected Linux system can stall or hang during task scheduling. This happens because the scheduler fails to acquire a required context ID for a vfork()ed task, leading to an endless loop or stall in the kernel. Such a stall can cause system unresponsiveness, potentially requiring a reboot or manual intervention to recover.