| Summary | In the Linux kernel, the following vulnerability has been resolved: sched/mmcid: Prevent CID stalls due to concurrent forks A newly forked task is accounted as MMCID user before the task is visible CPU1 CPU2 As tnew1 is not visible yet, this fails to fix up the already allocated CID Move the invocation of sched_mm_cid_fork() after the new task becomes This also makes it symmetrical vs. exit() where the task is removed as CID |
|---|---|
| Publication Date | May 9, 2026, 12:16 a.m. |
| Registration Date | May 9, 2026, 4:14 a.m. |
| Last Update | May 9, 2026, 12:16 a.m. |