- Description
- The hypervisor contains code to accelerate VGA memory accesses for HVM guests, when the (virtual) VGA is in "standard" mode. Locking involved there has an unusual discipline, leaving a lock acquired past the return from the function that acquired it. This behavior results in a problem when emulating an instruction with two memory accesses, both of which touch VGA memory (plus some further constraints which aren't relevant here). When emulating the 2nd access, the lock that is already being held would be attempted to be re-acquired, resulting in a deadlock. This deadlock was already found when the code was first introduced, but was analysed incorrectly and the fix was incomplete. Analysis in light of the new finding cannot find a way to make the existing locking discipline work. In staging, this logic has all been removed because it was discovered to be accidentally disabled since Xen 4.7. Therefore, we are fixing the locking problem by backporting the removal of most of the feature. Note that even with the feature disabled, the lock would still be acquired for any accesses to the VGA MMIO region.
- Source
- security@xen.org
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 6.5
- Impact score
- 4
- Exploitability score
- 2
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
- Severity
- MEDIUM
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-667
- Hype score
- Not currently trending
CVE-2024-45818 Deadlock Vulnerability in Xen Hypervisor VGA Memory Access The hypervisor has code to speed up VGA memory access for HVM guests in "standard" mode. The locking used here is unique. It keeps a lock ... https://t.co/lXeiqwPW47
@VulmonFeeds
19 Dec 2024
38 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-45818 The hypervisor contains code to accelerate VGA memory accesses for HVM guests, when the (virtual) VGA is in "standard" mode. Locking involved there has an unusual di… https://t.co/uCJBWdPLX9
@CVEnew
19 Dec 2024
494 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Security Alert: #Citrix releases a critical update for CVE-2024-45818, which affects XenServer and Citrix Hypervisor. Patch now to secure your systems! Learn more: https://t.co/cM72wTYh4b #CyberSecurity #Update https://t.co/KrR2dQ2Bf1
@FerroqueSystems
12 Nov 2024
38 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes