Because of a logical error in XSA-407 (Branch Type Confusion), the
mitigation is not applied properly when it is intended to be used.
XSA-434 (Speculative Return Stack Overflow) uses the same
infrastructure, so is equally impacted.
For more details, see:
https://xenbits.xen.org/xsa/advisory-407.html
https://xenbits.xen.org/xsa/advisory-434.html
References
| Link | Resource |
|---|---|
| https://xenbits.xenproject.org/xsa/advisory-455.html | Patch Vendor Advisory |
| http://xenbits.xen.org/xsa/advisory-455.html | Patch Vendor Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5OK6MH75S7YWD34EWW7QIZTS627RIE3/ | Mailing List Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYAZ7P6YFJ2E3FHKAGIKHWS46KYMMTZH/ | Mailing List Third Party Advisory |
| https://xenbits.xenproject.org/xsa/advisory-455.html | Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2024-05-16 14:15
Updated : 2026-01-05 19:00
NVD link : CVE-2024-31142
Mitre link : CVE-2024-31142
CVE.ORG link : CVE-2024-31142
JSON object : View
Products Affected
xen
- xen
fedoraproject
- fedora
CWE
CWE-693
Protection Mechanism Failure
