๐Ÿ” CVE Alert

CVE-2026-31734

UNKNOWN 0.0

sched_ext: Fix is_bpf_migration_disabled() false negative on non-PREEMPT_RCU

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: sched_ext: Fix is_bpf_migration_disabled() false negative on non-PREEMPT_RCU Since commit 8e4f0b1ebcf2 ("bpf: use rcu_read_lock_dont_migrate() for trampoline.c"), the BPF prolog (__bpf_prog_enter) calls migrate_disable() only when CONFIG_PREEMPT_RCU is enabled, via rcu_read_lock_dont_migrate(). Without CONFIG_PREEMPT_RCU, the prolog never touches migration_disabled, so migration_disabled == 1 always means the task is truly migration-disabled regardless of whether it is the current task. The old unconditional p == current check was a false negative in this case, potentially allowing a migration-disabled task to be dispatched to a remote CPU and triggering scx_error in task_can_run_on_remote_rq(). Only apply the p == current disambiguation when CONFIG_PREEMPT_RCU is enabled, where the ambiguity with the BPF prolog still exists.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 1, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
8e4f0b1ebcf2180ab594f204f01279a666dadf3b < 72c43eb2e334febe93018cfb68ae828f55c6e49e 8e4f0b1ebcf2180ab594f204f01279a666dadf3b < b4992a9446bb9a639007bfd32bf5c5a7e30199e5 8e4f0b1ebcf2180ab594f204f01279a666dadf3b < 0c4a59df370bea245695c00aaae6ae75747139bd
Linux / Linux
6.18

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/72c43eb2e334febe93018cfb68ae828f55c6e49e git.kernel.org: https://git.kernel.org/stable/c/b4992a9446bb9a639007bfd32bf5c5a7e30199e5 git.kernel.org: https://git.kernel.org/stable/c/0c4a59df370bea245695c00aaae6ae75747139bd