๐Ÿ” CVE Alert

CVE-2024-45818

MEDIUM 6.5

Deadlock in x86 HVM standard VGA handling

CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th

The hypervisor contains code to accelerate VGA memory accesses for HVM guests, when the (virtual) VGA is in "standard" mode. Locking involved there has an unusual discipline, leaving a lock acquired past the return from the function that acquired it. This behavior results in a problem when emulating an instruction with two memory accesses, both of which touch VGA memory (plus some further constraints which aren't relevant here). When emulating the 2nd access, the lock that is already being held would be attempted to be re-acquired, resulting in a deadlock. This deadlock was already found when the code was first introduced, but was analysed incorrectly and the fix was incomplete. Analysis in light of the new finding cannot find a way to make the existing locking discipline work. In staging, this logic has all been removed because it was discovered to be accidentally disabled since Xen 4.7. Therefore, we are fixing the locking problem by backporting the removal of most of the feature. Note that even with the feature disabled, the lock would still be acquired for any accesses to the VGA MMIO region.

Vendor xen
Product xen
Published Dec 19, 2024
Last Updated Dec 31, 2024
Stay Ahead of the Next One

Get instant alerts for xen xen

Be the first to know when new medium vulnerabilities affecting xen xen are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Xen / Xen
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
xenbits.xenproject.org: https://xenbits.xenproject.org/xsa/advisory-463.html openwall.com: http://www.openwall.com/lists/oss-security/2024/11/12/2 xenbits.xen.org: http://xenbits.xen.org/xsa/advisory-463.html

Credits

This issue was discovered by Manuel Andreas of Technical University of Munich.