CVE-2024-58019
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-58019 affects the Linux kernel's GSP (GPU System Processor) message queue handling in the NVIDIA kernel module (nvkm). The vulnerability was discovered in February 2024 and impacts systems using NVIDIA GPUs with GSP functionality. The issue stems from incorrect read pointer advancement in the GSP message queue implementation (Kernel Git).

Technical details

The vulnerability occurs due to incorrect handling of GSP event messages, which consist of three parts: message header, RPC header, and message body. While GSP calculates page numbers based on total message size, nvkm only considers RPC header and message body sizes when advancing the read pointer. When processing a two-page GSP message in non-rollback cases, it incorrectly interprets the previous message's body as the next message's header. This leads to calculation errors where the message length becomes zero, resulting in an invalid size calculation of '0xffffffxx' (Kernel Git).

Impact

The vulnerability can trigger a kernel panic due to NULL pointer dereference, leading to system crashes and potential denial of service. This is particularly impactful when vGPU functionality is enabled, as two-page GSP messages are commonly observed in such configurations (Kernel Git).

Mitigation and workarounds

The issue has been fixed in the Linux kernel through a patch that correctly handles the total message size when advancing the read pointer. The fix involves taking into account the complete message size (including headers) and calculating the read pointer advancement at the end of all copies for rollback cases (Kernel Git).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management