๐Ÿ” CVE Alert

CVE-2024-31145

HIGH 7.5

error handling in x86 IOMMU identity mapping

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th

Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. In the logic establishing these mappings, error handling was flawed, resulting in such mappings to potentially remain in place when they should have been removed again. Respective guests would then gain access to memory regions which they aren't supposed to have access to.

Vendor xen
Product xen
Published Sep 25, 2024
Last Updated Sep 25, 2024
Stay Ahead of the Next One

Get instant alerts for xen xen

Be the first to know when new high vulnerabilities affecting xen xen are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Xen / Xen
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
xenbits.xenproject.org: https://xenbits.xenproject.org/xsa/advisory-460.html xenbits.xen.org: http://xenbits.xen.org/xsa/advisory-460.html openwall.com: http://www.openwall.com/lists/oss-security/2024/08/14/2

Credits

This issue was discovered by Teddy Astie of Vates and diagnosed as a security issue by Jan Beulich of SUSE.