CVE-2024-53240

In the Linux kernel, the following vulnerability has been resolved: xen/netfront: fix crash when removing device When removing a netfront device directly after a suspend/resume cycle it might happen that the queues have not been setup again, causing a crash during the attempt to stop the queues another time. Fix that by checking the queues are existing before trying to stop them. This is XSA-465 / CVE-2024-53240.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*

History

03 Nov 2025, 21:17

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html -
  • () https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html -

08 Oct 2025, 14:50

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: xen/netfront: se corrige un fallo al eliminar un dispositivo Al eliminar un dispositivo netfront directamente después de un ciclo de suspensión/reanudación, puede suceder que las colas no se hayan configurado nuevamente, lo que provoca un fallo durante el intento de detener las colas otra vez. Solucione esto comprobando que las colas existen antes de intentar detenerlas. Esto es XSA-465 / CVE-2024-53240.
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/1d5354a9182b6d302ae10367cbec1ca339d4e4e7 - () https://git.kernel.org/stable/c/1d5354a9182b6d302ae10367cbec1ca339d4e4e7 - Patch
References () https://git.kernel.org/stable/c/20f7f0cf7af5d81b218202ef504223af84b16a8f - () https://git.kernel.org/stable/c/20f7f0cf7af5d81b218202ef504223af84b16a8f - Patch
References () https://git.kernel.org/stable/c/2657ba851fa3381256d81e431b20041dc232fd88 - () https://git.kernel.org/stable/c/2657ba851fa3381256d81e431b20041dc232fd88 - Patch
References () https://git.kernel.org/stable/c/7728e974ffbf14f17648dd92ea640b42b654d47c - () https://git.kernel.org/stable/c/7728e974ffbf14f17648dd92ea640b42b654d47c - Patch
References () https://git.kernel.org/stable/c/8b41e6bccf7de93982781be4125211443382e66d - () https://git.kernel.org/stable/c/8b41e6bccf7de93982781be4125211443382e66d - Patch
References () https://git.kernel.org/stable/c/f9244fb55f37356f75c739c57323d9422d7aa0f8 - () https://git.kernel.org/stable/c/f9244fb55f37356f75c739c57323d9422d7aa0f8 - Patch
References () https://git.kernel.org/stable/c/fe9a8f5250aed0948b668c8a4e051e3b0fc29f09 - () https://git.kernel.org/stable/c/fe9a8f5250aed0948b668c8a4e051e3b0fc29f09 - Patch
References () http://xenbits.xen.org/xsa/advisory-465.html - () http://xenbits.xen.org/xsa/advisory-465.html - Third Party Advisory
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.7

24 Dec 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-24 10:15

Updated : 2025-11-03 21:17


NVD link : CVE-2024-53240

Mitre link : CVE-2024-53240

CVE.ORG link : CVE-2024-53240


JSON object : View

Products Affected

linux

  • linux_kernel