
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, a vulnerability was discovered related to sched_fork() races. The issue arose when commit 4ef0c5c6b5ba, which fixed a fork race vs cgroup, inadvertently introduced a race condition vs syscalls by not placing the task on the runqueue before it gets exposed through the pidhash (Kernel Patch).
The vulnerability affects the Linux kernel scheduler, specifically in the task creation process. The issue occurs in the sched_fork() function where tasks are not properly placed on the runqueue before being exposed through the pidhash. This vulnerability has been assigned a CVSS v3.1 Base Score of 5.5 (Medium) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).
The vulnerability can lead to potential race conditions in the Linux kernel scheduler, affecting system stability and potentially causing task scheduling issues. The impact is primarily on availability, with no direct effect on confidentiality or integrity (NVD).
The issue has been fixed through a patch that modifies the task creation process to ensure proper placement of tasks on the runqueue before exposure through the pidhash. The fix effectively reverts the problematic changes introduced by commit 4ef0c5c6b5ba (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."