Description
In the Linux kernel, the following vulnerability has been resolved:

sched_ext: Remove redundant css_put() in scx_cgroup_init()

The iterator css_for_each_descendant_pre() walks the cgroup hierarchy
under cgroup_lock(). It does not increment the reference counts on
yielded css structs.

According to the cgroup documentation, css_put() should only be used
to release a reference obtained via css_get() or css_tryget_online().
Since the iterator does not use either of these to acquire a reference,
calling css_put() in the error path of scx_cgroup_init() causes a
refcount underflow.

Remove the unbalanced css_put() to prevent a potential Use-After-Free
(UAF) vulnerability.
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Linux kernel scheduler extension contains a redundant css_put() call in the error path of scx_cgroup_init(). Because the iterator css_for_each_descendant_pre() does not acquire references before yielding css structures, the extra css_put() causes a reference‑count underflow. This imbalance can lead to a use‑after‑free condition in kernel memory, enabling an attacker to corrupt or overwrite memory and potentially gain arbitrary code execution or cause a system crash.

Affected Systems

All Linux kernel versions that have not yet incorporated the commit that removes the redundant css_put() in scx_cgroup_init() are affected. The fix is present in the kernel source tree referenced by git commit identifiers, so any release based on a kernel snapshot that includes that change is considered safe. No specific version numbers were supplied.

Risk and Exploitability

The CVSS severity is not provided in the advisory, but the EPSS score indicates a probability of less than 1%. The vulnerability is not listed in the CISA KEV catalog. Nonetheless, use‑after‑free bugs at the kernel level are generally considered high‑risk because they can allow privileged attackers to execute arbitrary code with kernel privileges. The likely attack vector would involve an attacker with the ability to trigger the error path in scx_cgroup_init(), such as through malformed cgroup operations, but explicit exploitation details are not disclosed here.

Generated by OpenCVE AI on May 9, 2026 at 15:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a Linux kernel update that includes the commit removing the redundant css_put() (see the cited git commits).
  • If a timely update is not available, backport the fix by editing the kernel source to remove the css_put() call in scx_cgroup_init() and rebuild the kernel.
  • After updating the kernel, reboot the system to ensure the patched version is active. If the scheduler extension is not required for your environment, consider disabling the sched_ext feature to mitigate the risk until an official update can be applied.

Generated by OpenCVE AI on May 9, 2026 at 15:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416

Sat, 09 May 2026 12:15:00 +0000


Fri, 08 May 2026 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: sched_ext: Remove redundant css_put() in scx_cgroup_init() The iterator css_for_each_descendant_pre() walks the cgroup hierarchy under cgroup_lock(). It does not increment the reference counts on yielded css structs. According to the cgroup documentation, css_put() should only be used to release a reference obtained via css_get() or css_tryget_online(). Since the iterator does not use either of these to acquire a reference, calling css_put() in the error path of scx_cgroup_init() causes a refcount underflow. Remove the unbalanced css_put() to prevent a potential Use-After-Free (UAF) vulnerability.
Title sched_ext: Remove redundant css_put() in scx_cgroup_init()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T14:22:07.980Z

Reserved: 2026-05-01T14:12:56.009Z

Link: CVE-2026-43438

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:56.160

Modified: 2026-05-08T15:16:56.160

Link: CVE-2026-43438

cve-icon Redhat

Severity :

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43438 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T16:00:13Z

Weaknesses