First published: Tue Jan 21 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: gve: guard XSK operations on the existence of queues This patch predicates the enabling and disabling of XSK pools on the existence of queues. As it stands, if the interface is down, disabling or enabling XSK pools would result in a crash, as the RX queue pointer would be NULL. XSK pool registration will occur as part of the next interface up. Similarly, xsk_wakeup needs be guarded against queues disappearing while the function is executing, so a check against the GVE_PRIV_FLAGS_NAPI_ENABLED flag is added to synchronize with the disabling of the bit and the synchronize_net() in gve_turndown.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | ||
Linux kernel | >=6.4<6.6.70 | |
Linux kernel | >=6.7<6.12.9 | |
Linux kernel | =6.13-rc1 | |
Linux kernel | =6.13-rc2 | |
Linux kernel | =6.13-rc3 | |
Linux kernel | =6.13-rc4 | |
Linux kernel | =6.13-rc5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-57933 is considered a medium severity vulnerability in the Linux kernel.
To fix CVE-2024-57933, update to the latest Linux kernel version that addresses this vulnerability.
CVE-2024-57933 affects Linux kernel versions between 6.4 and 6.6.70 and from 6.7 to 6.12.9, as well as specific release candidates.
CVE-2024-57933 is a vulnerability related to erroneous operation handling in the Linux kernel's XSK pools.
Yes, a patch has been implemented in the Linux kernel to guard XSK operations based on the existence of queues.