CVE-2024-53241

In the Linux kernel, the following vulnerability has been resolved: x86/xen: don't do PV iret hypercall through hypercall page Instead of jumping to the Xen hypercall page for doing the iret hypercall, directly code the required sequence in xen-asm.S. This is done in preparation of no longer using hypercall page at all, as it has shown to cause problems with speculation mitigations. This is part of XSA-466 / CVE-2024-53241.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*

History

08 Oct 2025, 14:48

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/05df6e6cd9a76b778aee33c3c18c9f3b3566d4a5 - () https://git.kernel.org/stable/c/05df6e6cd9a76b778aee33c3c18c9f3b3566d4a5 - Patch
References () https://git.kernel.org/stable/c/82c211ead1ec440dbf81727e17b03b5e3c44b93d - () https://git.kernel.org/stable/c/82c211ead1ec440dbf81727e17b03b5e3c44b93d - Patch
References () https://git.kernel.org/stable/c/a2796dff62d6c6bfc5fbebdf2bee0d5ac0438906 - () https://git.kernel.org/stable/c/a2796dff62d6c6bfc5fbebdf2bee0d5ac0438906 - Patch
References () https://git.kernel.org/stable/c/c7b4cfa6213a44fa48714186dfdf125072d036e3 - () https://git.kernel.org/stable/c/c7b4cfa6213a44fa48714186dfdf125072d036e3 - Patch
References () https://git.kernel.org/stable/c/f7c3fdad0a474062d566aae3289d490d7e702d30 - () https://git.kernel.org/stable/c/f7c3fdad0a474062d566aae3289d490d7e702d30 - Patch
References () https://git.kernel.org/stable/c/fa719857f613fed94a79da055b13ca51214c694f - () https://git.kernel.org/stable/c/fa719857f613fed94a79da055b13ca51214c694f - Patch
References () http://www.openwall.com/lists/oss-security/2024/12/17/2 - () http://www.openwall.com/lists/oss-security/2024/12/17/2 - Mailing List
References () http://www.openwall.com/lists/oss-security/2024/12/23/1 - () http://www.openwall.com/lists/oss-security/2024/12/23/1 - Mailing List
References () http://www.openwall.com/lists/oss-security/2025/01/05/1 - () http://www.openwall.com/lists/oss-security/2025/01/05/1 - Mailing List
References () http://www.openwall.com/lists/oss-security/2025/01/05/2 - () http://www.openwall.com/lists/oss-security/2025/01/05/2 - Mailing List
References () http://xenbits.xen.org/xsa/advisory-466.html - () http://xenbits.xen.org/xsa/advisory-466.html - Third Party Advisory
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

05 Jan 2025, 07:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/01/05/1 -
  • () http://www.openwall.com/lists/oss-security/2025/01/05/2 -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86/xen: no realizar la hiperllamada de PV iret a través de la página de hiperllamada En lugar de saltar a la página de hiperllamada de Xen para realizar la hiperllamada iret, codificar directamente la secuencia requerida en xen-asm.S. Esto se hace como preparación para no utilizar más la página de hiperllamada, ya que se ha demostrado que causa problemas con las mitigaciones de especulación. Esto es parte de XSA-466 / CVE-2024-53241.

24 Dec 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-24 10:15

Updated : 2025-10-08 14:48


NVD link : CVE-2024-53241

Mitre link : CVE-2024-53241

CVE.ORG link : CVE-2024-53241


JSON object : View

Products Affected

linux

  • linux_kernel