First published: Tue Jan 21 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: gve: guard XDP xmit NDO on existence of xdp queues In GVE, dedicated XDP queues only exist when an XDP program is installed and the interface is up. As such, the NDO XDP XMIT callback should return early if either of these conditions are false. In the case of no loaded XDP program, priv->num_xdp_queues=0 which can cause a divide-by-zero error, and in the case of interface down, num_xdp_queues remains untouched to persist XDP queue count for the next interface up, but the TX pointer itself would be NULL. The XDP xmit callback also needs to synchronize with a device transitioning from open to close. This synchronization will happen via the GVE_PRIV_FLAGS_NAPI_ENABLED bit along with a synchronize_net() call, which waits for any RCU critical sections at call-time to complete.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-57932 has a medium severity rating as it affects the performance of the GVE driver in the Linux kernel.
To fix CVE-2024-57932, update your Linux kernel to the latest stable version that includes the patch addressing this vulnerability.
CVE-2024-57932 affects specific versions of the Linux kernel that include the GVE driver with the vulnerable code.
The potential impacts of CVE-2024-57932 may include improper handling of XDP packets and degraded network performance.
Currently, the best approach is to monitor the network interfaces and limit the usage of XDP until a patched kernel is deployed.