Advisory Published
Updated

CVE-2024-41932: sched: fix warning in sched_setaffinity

First published: Sat Jan 11 2025(Updated: )

In the Linux kernel, the following vulnerability has been resolved: sched: fix warning in sched_setaffinity Commit 8f9ea86fdf99b added some logic to sched_setaffinity that included a WARN when a per-task affinity assignment races with a cpuset update. Specifically, we can have a race where a cpuset update results in the task affinity no longer being a subset of the cpuset. That's fine; we have a fallback to instead use the cpuset mask. However, we have a WARN set up that will trigger if the cpuset mask has no overlap at all with the requested task affinity. This shouldn't be a warning condition; its trivial to create this condition. Reproduced the warning by the following setup: - $PID inside a cpuset cgroup - another thread repeatedly switching the cpuset cpus from 1-2 to just 1 - another thread repeatedly setting the $PID affinity (via taskset) to 2

Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

Affected SoftwareAffected VersionHow to fix
Linux Kernel
debian/linux
5.10.223-1
5.10.234-1
6.1.129-1
6.1.128-1
6.12.20-1
6.12.21-1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-41932?

    CVE-2024-41932 has been classified as a low-severity issue.

  • How do I fix CVE-2024-41932?

    To fix CVE-2024-41932, update the Linux kernel to the latest stable version that includes the vulnerability resolution.

  • What does CVE-2024-41932 affect?

    CVE-2024-41932 affects the Linux kernel, specifically the sched_setaffinity function.

  • Is CVE-2024-41932 remotely exploitable?

    CVE-2024-41932 is not considered to be remotely exploitable as it pertains to local task management.

  • What is the impact of CVE-2024-41932?

    The impact of CVE-2024-41932 could lead to warning messages when tasks compete for CPU affinity during cpuset updates.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203