First published: Fri Sep 13 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: pktgen: use cpus_read_lock() in pg_net_init() I have seen the WARN_ON(smp_processor_id() != cpu) firing in pktgen_thread_worker() during tests. We must use cpus_read_lock()/cpus_read_unlock() around the for_each_online_cpu(cpu) loop. While we are at it use WARN_ON_ONCE() to avoid a possible syslog flood.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=2.6.12<6.10.8 | |
Linux Kernel | =6.11-rc1 | |
Linux Kernel | =6.11-rc2 | |
Linux Kernel | =6.11-rc3 | |
Linux Kernel | =6.11-rc4 | |
Linux Kernel | =6.11-rc5 | |
debian/linux | <=5.10.223-1<=5.10.234-1<=6.1.129-1<=6.1.135-1 | 6.12.22-1 6.12.25-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-46681 is classified as a moderate severity vulnerability in the Linux kernel.
To fix CVE-2024-46681, update the Linux kernel to version 6.12.11-1 or newer.
CVE-2024-46681 affects Linux kernel versions from 2.6.12 up to 6.10.8, including specific release candidates of 6.11.
The issue in CVE-2024-46681 is caused by improper locking in the pktgen module, leading to potential inconsistencies.
If your Linux kernel version is between 2.6.12 and 6.10.8 or one of the 6.11 release candidates, it is vulnerable to CVE-2024-46681.