CVE-2024-42245: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: Revert "sched/fair: Make sure to try to detach at least one movable task" This reverts commit b0defa7ae03ecf91b8bfd10ede430cff12fcbd06. b0defa7ae03ec changed the load balancing logic to ignore env.max_loop if all tasks examined to that point were pinned. The goal of the patch was to make it more likely to be able to detach a task buried in a long list of pinned tasks. However, this has the unfortunate side effect of creating an O(n) iteration in detach_tasks(), as we now must fully iterate every task on a cpu if all or most are pinned. Since this load balance code is done with rq lock held, and often in softirq context, it is very easy to trigger hard lockups. We observed such hard lockups with a user who affined O(10k) threads to a single cpu. When I discussed this with Vincent he initially suggested that we keep the limit on the number of tasks to detach, but increase the number of tasks we can search. However, after some back and forth on the mailing list, he recommended we instead revert the original patch, as it seems likely no one was actually getting hit by the original issue.
AI Analysis
Technical Summary
CVE-2024-42245 is a vulnerability identified in the Linux kernel's CPU scheduler, specifically related to the load balancing logic within the fair scheduler (sched/fair). The issue arose from a patch (commit b0defa7ae03ecf91b8bfd10ede430cff12fcbd06) intended to improve task detachment from CPUs by ignoring the env.max_loop limit if all tasks examined were pinned. Pinned tasks are those affined to a specific CPU and cannot be moved. The patch aimed to increase the likelihood of detaching a movable task buried among many pinned tasks. However, this change inadvertently introduced an O(n) complexity iteration in the detach_tasks() function, where n is the number of tasks on a CPU. Since this code executes while holding the runqueue (rq) lock and often in softirq context, it can cause significant CPU lockups if triggered. The vulnerability manifests when a large number of threads (on the order of 10,000) are affined to a single CPU, causing the scheduler to perform extensive iterations under lock, leading to hard system lockups or hangs. After discussions among kernel maintainers, the patch was reverted because the original problem it sought to fix was rare or non-existent, and the introduced side effect was more severe. This vulnerability does not have known exploits in the wild and affects Linux kernel versions containing the problematic commit. No CVSS score has been assigned yet.
Potential Impact
For European organizations relying on Linux-based systems, especially those running high-performance computing, virtualization hosts, or container orchestration platforms, this vulnerability could lead to system instability or denial of service through CPU lockups. Systems with workloads that heavily pin large numbers of threads to single CPUs are particularly at risk. This could affect critical infrastructure, cloud service providers, and enterprises using Linux servers for essential services. The impact is primarily on availability, as the vulnerability can cause hard lockups, making affected systems unresponsive and requiring manual intervention or reboot. Confidentiality and integrity are not directly impacted. Given the nature of the vulnerability, exploitation requires specific workload conditions (many pinned threads), which may limit widespread exploitation but could be triggered inadvertently or maliciously in multi-tenant environments or by insider threats.
Mitigation Recommendations
Organizations should ensure their Linux kernels are updated to versions where this problematic patch has been reverted or fixed by subsequent updates. Specifically, applying the latest stable kernel releases from trusted vendors or distributions is critical. Monitoring and limiting the number of threads pinned to a single CPU can reduce the risk of triggering this vulnerability. System administrators should audit workloads and affinity settings to avoid excessive thread pinning. In environments where custom kernel builds are used, verify that the reverted patch is not present. Additionally, implement resource management policies in container orchestration or virtualization platforms to prevent tenants or users from creating workloads that could cause such CPU affinity extremes. Employing kernel live patching solutions where available can help mitigate the issue without requiring full system reboots.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2024-42245: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: Revert "sched/fair: Make sure to try to detach at least one movable task" This reverts commit b0defa7ae03ecf91b8bfd10ede430cff12fcbd06. b0defa7ae03ec changed the load balancing logic to ignore env.max_loop if all tasks examined to that point were pinned. The goal of the patch was to make it more likely to be able to detach a task buried in a long list of pinned tasks. However, this has the unfortunate side effect of creating an O(n) iteration in detach_tasks(), as we now must fully iterate every task on a cpu if all or most are pinned. Since this load balance code is done with rq lock held, and often in softirq context, it is very easy to trigger hard lockups. We observed such hard lockups with a user who affined O(10k) threads to a single cpu. When I discussed this with Vincent he initially suggested that we keep the limit on the number of tasks to detach, but increase the number of tasks we can search. However, after some back and forth on the mailing list, he recommended we instead revert the original patch, as it seems likely no one was actually getting hit by the original issue.
AI-Powered Analysis
Technical Analysis
CVE-2024-42245 is a vulnerability identified in the Linux kernel's CPU scheduler, specifically related to the load balancing logic within the fair scheduler (sched/fair). The issue arose from a patch (commit b0defa7ae03ecf91b8bfd10ede430cff12fcbd06) intended to improve task detachment from CPUs by ignoring the env.max_loop limit if all tasks examined were pinned. Pinned tasks are those affined to a specific CPU and cannot be moved. The patch aimed to increase the likelihood of detaching a movable task buried among many pinned tasks. However, this change inadvertently introduced an O(n) complexity iteration in the detach_tasks() function, where n is the number of tasks on a CPU. Since this code executes while holding the runqueue (rq) lock and often in softirq context, it can cause significant CPU lockups if triggered. The vulnerability manifests when a large number of threads (on the order of 10,000) are affined to a single CPU, causing the scheduler to perform extensive iterations under lock, leading to hard system lockups or hangs. After discussions among kernel maintainers, the patch was reverted because the original problem it sought to fix was rare or non-existent, and the introduced side effect was more severe. This vulnerability does not have known exploits in the wild and affects Linux kernel versions containing the problematic commit. No CVSS score has been assigned yet.
Potential Impact
For European organizations relying on Linux-based systems, especially those running high-performance computing, virtualization hosts, or container orchestration platforms, this vulnerability could lead to system instability or denial of service through CPU lockups. Systems with workloads that heavily pin large numbers of threads to single CPUs are particularly at risk. This could affect critical infrastructure, cloud service providers, and enterprises using Linux servers for essential services. The impact is primarily on availability, as the vulnerability can cause hard lockups, making affected systems unresponsive and requiring manual intervention or reboot. Confidentiality and integrity are not directly impacted. Given the nature of the vulnerability, exploitation requires specific workload conditions (many pinned threads), which may limit widespread exploitation but could be triggered inadvertently or maliciously in multi-tenant environments or by insider threats.
Mitigation Recommendations
Organizations should ensure their Linux kernels are updated to versions where this problematic patch has been reverted or fixed by subsequent updates. Specifically, applying the latest stable kernel releases from trusted vendors or distributions is critical. Monitoring and limiting the number of threads pinned to a single CPU can reduce the risk of triggering this vulnerability. System administrators should audit workloads and affinity settings to avoid excessive thread pinning. In environments where custom kernel builds are used, verify that the reverted patch is not present. Additionally, implement resource management policies in container orchestration or virtualization platforms to prevent tenants or users from creating workloads that could cause such CPU affinity extremes. Employing kernel live patching solutions where available can help mitigate the issue without requiring full system reboots.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-07-30T07:40:12.254Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9828c4522896dcbe1cd8
Added to database: 5/21/2025, 9:08:56 AM
Last enriched: 6/29/2025, 6:11:46 AM
Last updated: 8/1/2025, 7:03:14 AM
Views: 11
Related Threats
CVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9087: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.