CVE-2024-53241

Source
https://cve.org/CVERecord?id=CVE-2024-53241
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53241.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-53241
Downstream
Related
Published
2024-12-24T09:24:42.212Z
Modified
2026-03-20T12:40:50.941047Z
Summary
x86/xen: don't do PV iret hypercall through hypercall page
Details

In the Linux kernel, the following vulnerability has been resolved:

x86/xen: don't do PV iret hypercall through hypercall page

Instead of jumping to the Xen hypercall page for doing the iret hypercall, directly code the required sequence in xen-asm.S.

This is done in preparation of no longer using hypercall page at all, as it has shown to cause problems with speculation mitigations.

This is part of XSA-466 / CVE-2024-53241.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53241.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
cdacc1278b12d929f9a053c245ff3d16eb7af9f8
Fixed
05df6e6cd9a76b778aee33c3c18c9f3b3566d4a5
Fixed
c7b4cfa6213a44fa48714186dfdf125072d036e3
Fixed
fa719857f613fed94a79da055b13ca51214c694f
Fixed
82c211ead1ec440dbf81727e17b03b5e3c44b93d
Fixed
f7c3fdad0a474062d566aae3289d490d7e702d30
Fixed
a2796dff62d6c6bfc5fbebdf2bee0d5ac0438906

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53241.json"