CVE-2024-46681

Updated: 2024-09-21 05:02:49.24719

Description:

In the Linux kernel, the following vulnerability has been resolved: pktgen: use cpus_read_lock() in pg_net_init() I have seen the WARN_ON(smp_processor_id() != cpu) firing in pktgen_thread_worker() during tests. We must use cpus_read_lock()/cpus_read_unlock() around the for_each_online_cpu(cpu) loop. While we are at it use WARN_ON_ONCE() to avoid a possible syslog flood.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x MEDIUM 5.5

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 5.5 MEDIUM Ignored 2024-09-23 05:22:39
AlmaLinux 9.2 FIPS kernel 5.14.0 5.5 MEDIUM Ignored 2024-09-23 05:22:39
CentOS 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2024-09-23 05:22:39
CentOS 7 ELS kernel 3.10.0 5.5 MEDIUM Ignored 2024-09-23 05:22:39
CentOS 8.4 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2024-09-23 05:22:39
CentOS 8.5 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2024-09-23 05:22:39
CentOS Stream 8 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2024-09-23 05:22:39
CloudLinux 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2024-09-23 05:22:39
CloudLinux 7 ELS kernel 3.10.0 5.5 MEDIUM Ignored 2024-09-23 05:22:39
Oracle Linux 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2024-09-23 05:22:39
Total: 14