Advisory Published
Updated

CVE-2024-57932: gve: guard XDP xmit NDO on existence of xdp queues

First published: Tue Jan 21 2025(Updated: )

In the Linux kernel, the following vulnerability has been resolved: gve: guard XDP xmit NDO on existence of xdp queues In GVE, dedicated XDP queues only exist when an XDP program is installed and the interface is up. As such, the NDO XDP XMIT callback should return early if either of these conditions are false. In the case of no loaded XDP program, priv->num_xdp_queues=0 which can cause a divide-by-zero error, and in the case of interface down, num_xdp_queues remains untouched to persist XDP queue count for the next interface up, but the TX pointer itself would be NULL. The XDP xmit callback also needs to synchronize with a device transitioning from open to close. This synchronization will happen via the GVE_PRIV_FLAGS_NAPI_ENABLED bit along with a synchronize_net() call, which waits for any RCU critical sections at call-time to complete.

Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

Affected SoftwareAffected VersionHow to fix
Red Hat Kernel-devel

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-57932?

    CVE-2024-57932 has a medium severity rating as it affects the performance of the GVE driver in the Linux kernel.

  • How do I fix CVE-2024-57932?

    To fix CVE-2024-57932, update your Linux kernel to the latest stable version that includes the patch addressing this vulnerability.

  • What versions of the Linux kernel are affected by CVE-2024-57932?

    CVE-2024-57932 affects specific versions of the Linux kernel that include the GVE driver with the vulnerable code.

  • What are the potential impacts of CVE-2024-57932?

    The potential impacts of CVE-2024-57932 may include improper handling of XDP packets and degraded network performance.

  • Is there a workaround for CVE-2024-57932 until a fix is applied?

    Currently, the best approach is to monitor the network interfaces and limit the usage of XDP until a patched kernel is deployed.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203