CVE-2024-53241Improper Restriction of Operations within the Bounds of a Memory Buffer in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 98.41%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24
Latest updateAug 14

Description

In the Linux kernel, the following vulnerability has been resolved: x86/xen: don't do PV iret hypercall through hypercall page Instead of jumping to the Xen hypercall page for doing the iret hypercall, directly code the required sequence in xen-asm.S. This is done in preparation of no longer using hypercall page at all, as it has shown to cause problems with speculation mitigations. This is part of XSA-466 / CVE-2024-53241.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages5 packages

NVDlinux/linux_kernel5.115.15.175+5
Debianlinux/linux_kernel< 5.10.234-1+3
CVEListV5linux/linuxcdacc1278b12d929f9a053c245ff3d16eb7af9f805df6e6cd9a76b778aee33c3c18c9f3b3566d4a5+6
debiandebian/linux< linux 6.1.123-1 (bookworm)
debiandebian/linux-6.1< linux 6.1.123-1 (bookworm)

Patches

🔴Vulnerability Details

9
OSV
CVE-2024-53241: In the Linux kernel, the following vulnerability has been resolved: x86/xen: don't do PV iret hypercall through hypercall page Instead of jumping to t2024-12-24
GHSA
GHSA-w2vx-fp9q-36ph: In the Linux kernel, the following vulnerability has been resolved: x86/xen: don't do PV iret hypercall through hypercall page Instead of jumping to2024-12-24
Kernel
objtool/x86: allow syscall instruction2024-11-29
Kernel
x86/static-call: provide a way to do very early static-call updates2024-11-29
Kernel
x86/xen: remove hypercall page2024-10-17

📋Vendor Advisories

3
CISA ICS
Siemens Third-Party Components in SINEC OS2025-08-14
Red Hat
kernel: xen: Xen hypercall page unsafe against speculative attacks (Xen Security Advisory 466)2024-12-17
Debian
CVE-2024-53241: linux - In the Linux kernel, the following vulnerability has been resolved: x86/xen: do...2024