CVE-2024-41932
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
11/01/2025
Last modified:
15/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
sched: fix warning in sched_setaffinity<br />
<br />
Commit 8f9ea86fdf99b added some logic to sched_setaffinity that included<br />
a WARN when a per-task affinity assignment races with a cpuset update.<br />
<br />
Specifically, we can have a race where a cpuset update results in the<br />
task affinity no longer being a subset of the cpuset. That&#39;s fine; we<br />
have a fallback to instead use the cpuset mask. However, we have a WARN<br />
set up that will trigger if the cpuset mask has no overlap at all with<br />
the requested task affinity. This shouldn&#39;t be a warning condition; its<br />
trivial to create this condition.<br />
<br />
Reproduced the warning by the following setup:<br />
<br />
- $PID inside a cpuset cgroup<br />
- another thread repeatedly switching the cpuset cpus from 1-2 to just 1<br />
- another thread repeatedly setting the $PID affinity (via taskset) to 2
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.12.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



