Home

Description

In the Linux kernel, the following vulnerability has been resolved: x86/hyperv: Disable IBT when hypercall page lacks ENDBR instruction On hardware that supports Indirect Branch Tracking (IBT), Hyper-V VMs with ConfigVersion 9.3 or later support IBT in the guest. However, current versions of Hyper-V have a bug in that there's not an ENDBR64 instruction at the beginning of the hypercall page. Since hypercalls are made with an indirect call to the hypercall page, all hypercall attempts fail with an exception and Linux panics. A Hyper-V fix is in progress to add ENDBR64. But guard against the Linux panic by clearing X86_FEATURE_IBT if the hypercall page doesn't start with ENDBR. The VM will boot and run without IBT. If future Linux 32-bit kernels were to support IBT, additional hypercall page hackery would be needed to make IBT work for such kernels in a Hyper-V VM.

PUBLISHED Reserved 2025-12-30 | Published 2025-12-30 | Updated 2026-01-05 | Assigner Linux

Product status

Default status
unaffected

991625f3dd2cbc4b787deb0213e2bcf8fa264b21 (git) before 98cccbd0a19a161971bc7f7feb10577adc62c400
affected

991625f3dd2cbc4b787deb0213e2bcf8fa264b21 (git) before 73626b70b361ddda7c380e52c236aa4f2487c402
affected

991625f3dd2cbc4b787deb0213e2bcf8fa264b21 (git) before d5ace2a776442d80674eff9ed42e737f7dd95056
affected

Default status
affected

5.18
affected

Any version before 5.18
unaffected

6.1.45 (semver)
unaffected

6.4.10 (semver)
unaffected

6.5 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/98cccbd0a19a161971bc7f7feb10577adc62c400

git.kernel.org/...c/73626b70b361ddda7c380e52c236aa4f2487c402

git.kernel.org/...c/d5ace2a776442d80674eff9ed42e737f7dd95056

cve.org (CVE-2023-54172)

nvd.nist.gov (CVE-2023-54172)

Download JSON