cgroup: fix race between task migration and iteration

Summary

CVECVE-2026-43439
StatePUBLISHED
AssignerLinux
Source PriorityCVE Program / NVD first with legacy fallback
Published2026-05-08 15:16:56 UTC
Updated2026-05-08 15:16:56 UTC
DescriptionIn the Linux kernel, the following vulnerability has been resolved: cgroup: fix race between task migration and iteration When a task is migrated out of a css_set, cgroup_migrate_add_task() first moves it from cset->tasks to cset->mg_tasks via: list_move_tail(&task->cg_list, &cset->mg_tasks); If a css_task_iter currently has it->task_pos pointing to this task, css_set_move_task() calls css_task_iter_skip() to keep the iterator valid. However, since the task has already been moved to ->mg_tasks, the iterator is advanced relative to the mg_tasks list instead of the original tasks list. As a result, remaining tasks on cset->tasks, as well as tasks queued on cset->mg_tasks, can be skipped by iteration. Fix this by calling css_set_skip_task_iters() before unlinking task->cg_list from cset->tasks. This advances all active iterators to the next task on cset->tasks, so iteration continues correctly even when a task is concurrently being migrated. This race is hard to hit in practice without instrumentation, but it can be reproduced by artificially slowing down cgroup_procs_show(). For example, on an Android device a temporary /sys/kernel/cgroup/cgroup_test knob can be added to inject a delay into cgroup_procs_show(), and then: 1) Spawn three long-running tasks (PIDs 101, 102, 103). 2) Create a test cgroup and move the tasks into it. 3) Enable a large delay via /sys/kernel/cgroup/cgroup_test. 4) In one shell, read cgroup.procs from the test cgroup. 5) Within the delay window, in another shell migrate PID 102 by writing it to a different cgroup.procs file. Under this setup, cgroup.procs can intermittently show only PID 101 while skipping PID 103. Once the migration completes, reading the file again shows all tasks as expected. Note that this change does not allow removing the existing css_set_skip_task_iters() call in css_set_move_task(). The new call in cgroup_migrate_add_task() only handles iterators that are racing with migration while the task is still on cset->tasks. Iterators may also start after the task has been moved to cset->mg_tasks. If we dropped css_set_skip_task_iters() from css_set_move_task(), such iterators could keep task_pos pointing to a migrating task, causing css_task_iter_advance() to malfunction on the destination css_set, up to and including crashes or infinite loops. The race window between migration and iteration is very small, and css_task_iter is not on a hot path. In the worst case, when an iterator is positioned on the first thread of the migrating process, cgroup_migrate_add_task() may have to skip multiple tasks via css_set_skip_task_iters(). However, this only happens when migration and iteration actually race, so the performance impact is negligible compared to the correctness fix provided here.

Vendor Declared Affected Products

SourceVendorProductVersionPlatforms
CNA Linux Linux affected b636fd38dc40113f853337a7d2a6885ad23b8811 7c85debc35e6d131bd29c64f2ae78c6ede0e55c4 git Not specified
CNA Linux Linux affected b636fd38dc40113f853337a7d2a6885ad23b8811 3b95abab7369235a37b15eaec6e1a0b443bba7c7 git Not specified
CNA Linux Linux affected b636fd38dc40113f853337a7d2a6885ad23b8811 4a9654a2b46cfdaae287fb8995f536245635e467 git Not specified
CNA Linux Linux affected b636fd38dc40113f853337a7d2a6885ad23b8811 3dfd1328c05234e8d8fa61948b2ba82680594988 git Not specified
CNA Linux Linux affected b636fd38dc40113f853337a7d2a6885ad23b8811 9cca530c7cc1b3e02cb8fa7f80060dd4b38562ce git Not specified
CNA Linux Linux affected b636fd38dc40113f853337a7d2a6885ad23b8811 86ceaccfdfa16dad05addb33dc206e03589bcfd1 git Not specified
CNA Linux Linux affected b636fd38dc40113f853337a7d2a6885ad23b8811 9dc76f6fc0d28d2382583715bc4ec22f28104845 git Not specified
CNA Linux Linux affected b636fd38dc40113f853337a7d2a6885ad23b8811 5ee01f1a7343d6a3547b6802ca2d4cdce0edacb1 git Not specified
CNA Linux Linux affected b0af004fd58ded5f898630db008c5b824c27d7db git Not specified
CNA Linux Linux affected 370b9e6399da09fe10005fe455878b356de7b85f git Not specified
CNA Linux Linux affected 5.2 Not specified
CNA Linux Linux unaffected 5.2 semver Not specified
CNA Linux Linux unaffected 5.10.253 5.10.* semver Not specified
CNA Linux Linux unaffected 5.15.203 5.15.* semver Not specified
CNA Linux Linux unaffected 6.1.167 6.1.* semver Not specified
CNA Linux Linux unaffected 6.6.130 6.6.* semver Not specified
CNA Linux Linux unaffected 6.12.78 6.12.* semver Not specified
CNA Linux Linux unaffected 6.18.19 6.18.* semver Not specified
CNA Linux Linux unaffected 6.19.9 6.19.* semver Not specified
CNA Linux Linux unaffected 7.0 * original_commit_for_fix Not specified

References

ReferenceSourceLinkTags
git.kernel.org/stable/c/3dfd1328c05234e8d8fa61948b2ba82680594988 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/4a9654a2b46cfdaae287fb8995f536245635e467 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/9dc76f6fc0d28d2382583715bc4ec22f28104845 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/3b95abab7369235a37b15eaec6e1a0b443bba7c7 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/7c85debc35e6d131bd29c64f2ae78c6ede0e55c4 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/9cca530c7cc1b3e02cb8fa7f80060dd4b38562ce 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/5ee01f1a7343d6a3547b6802ca2d4cdce0edacb1 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/86ceaccfdfa16dad05addb33dc206e03589bcfd1 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report