First published: Tue Sep 24 2024(Updated: )
In x86's APIC (Advanced Programmable Interrupt Controller) architecture, error conditions are reported in a status register. Furthermore, the OS can opt to receive an interrupt when a new error occurs. It is possible to configure the error interrupt with an illegal vector, which generates an error when an error interrupt is raised. This case causes Xen to recurse through vlapic_error(). The recursion itself is bounded; errors accumulate in the the status register and only generate an interrupt when a new status bit becomes set. However, the lock protecting this state in Xen will try to be taken recursively, and deadlock.
Credit: security@xen.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen XAPI |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45817 has been classified as a critical severity vulnerability due to its potential impact on system stability and security.
To mitigate CVE-2024-45817, users should apply the latest patches provided by the Xen project or update to a secure version.
CVE-2024-45817 affects systems running the Xen hypervisor, particularly those with misconfigured APIC error interrupts.
CVE-2024-45817 is an interrupt handling vulnerability that can lead to unauthorized access or system crashes.
Currently, it is recommended to follow vendor guidance and apply patches as there are no documented workarounds for CVE-2024-45817.