CVE-2026-43418
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
08/05/2026
Last modified:
08/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
sched/mmcid: Prevent CID stalls due to concurrent forks<br />
<br />
A newly forked task is accounted as MMCID user before the task is visible<br />
in the process&#39; thread list and the global task list. This creates the<br />
following problem:<br />
<br />
CPU1 CPU2<br />
fork()<br />
sched_mm_cid_fork(tnew1)<br />
tnew1->mm.mm_cid_users++;<br />
tnew1->mm_cid.cid = getcid()<br />
-> preemption<br />
fork()<br />
sched_mm_cid_fork(tnew2)<br />
tnew2->mm.mm_cid_users++;<br />
// Reaches the per CPU threshold<br />
mm_cid_fixup_tasks_to_cpus()<br />
for_each_other(current, p)<br />
....<br />
<br />
As tnew1 is not visible yet, this fails to fix up the already allocated CID<br />
of tnew1. As a consequence a subsequent schedule in might fail to acquire a<br />
(transitional) CID and the machine stalls.<br />
<br />
Move the invocation of sched_mm_cid_fork() after the new task becomes<br />
visible in the thread and the task list to prevent this.<br />
<br />
This also makes it symmetrical vs. exit() where the task is removed as CID<br />
user before the task is removed from the thread and task lists.



