CVE-2024-41932
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-41932 is a vulnerability in the Linux kernel related to task scheduling and CPU affinity management. The issue was discovered in the sched_setaffinity functionality where a warning condition was incorrectly implemented when handling race conditions between per-task affinity assignments and cpuset updates. The vulnerability was disclosed on January 11, 2025, affecting various versions of the Linux kernel (NVD).

Technical details

The vulnerability stems from commit 8f9ea86fdf99b which added logic to sched_setaffinity that included a WARN condition when a per-task affinity assignment races with a cpuset update. The issue occurs when a cpuset update results in the task affinity no longer being a subset of the cpuset. While there is a fallback mechanism to use the cpuset mask, the WARN trigger was incorrectly set to fire when the cpuset mask has no overlap with the requested task affinity. This condition can be easily reproduced by setting up a PID inside a cpuset cgroup, having one thread switch the cpuset CPUs between 1-2 and 1, while another thread sets the PID affinity to 2 (Kernel Git).

Impact

The impact of this vulnerability is relatively low as it primarily affects system logging and debugging functionality. The issue results in unnecessary warning messages being generated in the system logs when legitimate CPU affinity operations are performed, potentially causing confusion or log pollution (Debian Tracker).

Mitigation and workarounds

The issue has been fixed by removing the incorrect WARN_ON_ONCE condition from the code. The fix was implemented in the Linux kernel through commit 70ee7947a29029736a1a06c73a48ff37674a851b. Various Linux distributions have incorporated the fix, including Debian Bullseye (5.10.234-1) and Bookworm (6.1.128-1) (Debian Tracker).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-68753HIGH7.8
  • Linux KernelLinux Kernel
  • linux-fips
NoYesJan 05, 2026
CVE-2025-68756HIGH7.1
  • Linux KernelLinux Kernel
  • linux-gcp-fips
NoYesJan 05, 2026
CVE-2025-68764MEDIUM5.5
  • Linux KernelLinux Kernel
  • linux-oracle-6.8
NoYesJan 05, 2026
CVE-2025-68758MEDIUM5.5
  • Linux KernelLinux Kernel
  • linux-nvidia-6.8
NoYesJan 05, 2026
CVE-2025-68762N/AN/A
  • Linux KernelLinux Kernel
  • kernel-devel
NoYesJan 05, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management