We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-46681

pktgen: use cpus_read_lock() in pg_net_init()



Description

In the Linux kernel, the following vulnerability has been resolved: pktgen: use cpus_read_lock() in pg_net_init() I have seen the WARN_ON(smp_processor_id() != cpu) firing in pktgen_thread_worker() during tests. We must use cpus_read_lock()/cpus_read_unlock() around the for_each_online_cpu(cpu) loop. While we are at it use WARN_ON_ONCE() to avoid a possible syslog flood.

Reserved 2024-09-11 | Published 2024-09-13 | Updated 2024-11-05 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f4 before 5f5f7366dda8
affected

1da177e4c3f4 before 979b581e4c69
affected

Default status
affected

2.6.12
affected

Any version before 2.6.12
unaffected

6.10.8
unaffected

6.11
unaffected

References

git.kernel.org/...c/5f5f7366dda8ae870e8305d6e7b3c0c2686cd2cf

git.kernel.org/...c/979b581e4c69257acab1af415ddad6b2d78a2fa5

cve.org (CVE-2024-46681)

nvd.nist.gov (CVE-2024-46681)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-46681

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.