CVE-2024-49699
Mar, 21/01/2025 – 14:15
CVE-2024-49699
CVE-2024-49699
Mar, 21/01/2025 – 14:15
CVE-2024-49699
CVE-2024-49688
Mar, 21/01/2025 – 14:15
CVE-2024-49688
CVE-2024-49666
Mar, 21/01/2025 – 14:15
CVE-2024-49666
CVE-2024-49655
Mar, 21/01/2025 – 14:15
CVE-2024-49655
CVE-2025-22262
Mar, 21/01/2025 – 14:15
CVE-2025-22262
CVE-2024-56277
Mar, 21/01/2025 – 14:15
CVE-2024-56277
CVE-2024-51919
Mar, 21/01/2025 – 14:15
CVE-2024-51919
CVE-2024-51888
Mar, 21/01/2025 – 14:15
CVE-2024-51888
CVE-2024-51818
Mar, 21/01/2025 – 14:15
CVE-2024-51818
CVE-2024-57933
Mar, 21/01/2025 – 12:15
CVE-2024-57933
gve: guard XSK operations on the existence of queues
This patch predicates the enabling and disabling of XSK pools on the
existence of queues. As it stands, if the interface is down, disabling
or enabling XSK pools would result in a crash, as the RX queue pointer
would be NULL. XSK pool registration will occur as part of the next
interface up.
Similarly, xsk_wakeup needs be guarded against queues disappearing
while the function is executing, so a check against the
GVE_PRIV_FLAGS_NAPI_ENABLED flag is added to synchronize with the
disabling of the bit and the synchronize_net() in gve_turndown.