{"id":"CVE-2024-53240","summary":"xen/netfront: fix crash when removing device","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nxen/netfront: fix crash when removing device\n\nWhen removing a netfront device directly after a suspend/resume cycle\nit might happen that the queues have not been setup again, causing a\ncrash during the attempt to stop the queues another time.\n\nFix that by checking the queues are existing before trying to stop\nthem.\n\nThis is XSA-465 / CVE-2024-53240.","modified":"2026-04-16T04:36:24.336588954Z","published":"2024-12-24T09:22:36.448Z","related":["SUSE-SU-2025:0117-1","SUSE-SU-2025:0153-1","SUSE-SU-2025:0154-1","SUSE-SU-2025:0201-1","SUSE-SU-2025:0201-2","SUSE-SU-2025:0202-1","SUSE-SU-2025:0203-1","SUSE-SU-2025:0229-1","SUSE-SU-2025:0230-1","SUSE-SU-2025:0231-1","SUSE-SU-2025:0236-1","SUSE-SU-2025:0289-1","SUSE-SU-2025:20165-1","SUSE-SU-2025:20166-1","SUSE-SU-2025:20248-1","SUSE-SU-2025:20249-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53240.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1d5354a9182b6d302ae10367cbec1ca339d4e4e7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/20f7f0cf7af5d81b218202ef504223af84b16a8f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2657ba851fa3381256d81e431b20041dc232fd88"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7728e974ffbf14f17648dd92ea640b42b654d47c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8b41e6bccf7de93982781be4125211443382e66d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f9244fb55f37356f75c739c57323d9422d7aa0f8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fe9a8f5250aed0948b668c8a4e051e3b0fc29f09"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"http://xenbits.xen.org/xsa/advisory-465.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53240.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53240"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"ed773dd798bf720756d20021b8d8a4a3d7184bda"},{"fixed":"20f7f0cf7af5d81b218202ef504223af84b16a8f"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"e6860c889f4ad50b6ab696f5ea154295d72cf27a"},{"fixed":"1d5354a9182b6d302ae10367cbec1ca339d4e4e7"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"e6e897d4fe2f89c0bd94600a40bedf5e6e75e050"},{"fixed":"2657ba851fa3381256d81e431b20041dc232fd88"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"d50b7914fae04d840ce36491d22133070b18cca9"},{"fixed":"8b41e6bccf7de93982781be4125211443382e66d"},{"fixed":"fe9a8f5250aed0948b668c8a4e051e3b0fc29f09"},{"fixed":"7728e974ffbf14f17648dd92ea640b42b654d47c"},{"fixed":"f9244fb55f37356f75c739c57323d9422d7aa0f8"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"99859947517e446058ad7243ee81d2f9801fa3dd"},{"last_affected":"f2dd60fd3fe98bd36a91b0c6e10bfe9d66258f84"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-53240.json"}}],"schema_version":"1.7.5"}