Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: sched_ext: Disable preemption between scx_claim_exit() and kicking helper work scx_claim_exit() atomically sets exit_kind, which prevents scx_error() from triggering further error handling. After claiming exit, the caller must kick the helper kthread work which initiates bypass mode and teardown. If the calling task gets preempted between claiming exit and kicking the helper work, and the BPF scheduler fails to schedule it back (since error handling is now disabled), the helper work is never queued, bypass mode never activates, tasks stop being dispatched, and the system wedges. Disable preemption across scx_claim_exit() and the subsequent work kicking in all callers - scx_disable() and scx_vexit(). Add lockdep_assert_preemption_disabled() to scx_claim_exit() to enforce the requirement.
References
- https://git.kernel.org/stable/c/41423912f7ac7494ccd6eef411227b4efce740e0
- https://git.kernel.org/stable/c/5131dbec2c10961b34f844bc30b400c3fa0bcc72
- https://git.kernel.org/stable/c/522acaae34aa7e05859260056b39c7c030592a0c
- https://git.kernel.org/stable/c/83236b2e43dba00bee5b82eb5758816b1a674f6a
FAQ
What is CVE-2026-43482?
CVE-2026-43482 is a documented vulnerability. In the Linux kernel, the following vulnerability has been resolved: sched_ext: Disable preemption between scx_claim_exit() and kicking helper work scx_claim_exit() atomically sets exit_kind, which p...
How severe is CVE-2026-43482?
CVSS scoring is not yet available for CVE-2026-43482. Check NVD for updates.
Is there a patch for CVE-2026-43482?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.