In the Linux kernel, the following vulnerability has been resolved:
pktgen: use cpusreadlock() in pgnetinit()
I have seen the WARNON(smpprocessorid() != cpu) firing in pktgenthread_worker() during tests.
We must use cpusreadlock()/cpusreadunlock() around the foreachonline_cpu(cpu) loop.
While we are at it use WARNONONCE() to avoid a possible syslog flood.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/blob/9c3874e559580d6c6ec8d449812ac11277724770/cves/2024/46xxx/CVE-2024-46681.json"
}