Unrated severityNVD Advisory· Published Sep 25, 2024· Updated Nov 20, 2024
x86: Deadlock in vlapic_error()
CVE-2024-45817
Description
In x86's APIC (Advanced Programmable Interrupt Controller) architecture, error conditions are reported in a status register. Furthermore, the OS can opt to receive an interrupt when a new error occurs.
It is possible to configure the error interrupt with an illegal vector, which generates an error when an error interrupt is raised.
This case causes Xen to recurse through vlapic_error(). The recursion itself is bounded; errors accumulate in the the status register and only generate an interrupt when a new status bit becomes set.
However, the lock protecting this state in Xen will try to be taken recursively, and deadlock.
Affected products
26- osv-coords25 versionspkg:rpm/opensuse/xen&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/xen&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/xen&distro=openSUSE%20Leap%20Micro%205.5pkg:rpm/opensuse/xen&distro=openSUSE%20Tumbleweedpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Micro%205.3pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Micro%205.4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Micro%205.5pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP5pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP5pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP6pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/xen&distro=SUSE%20Manager%20Proxy%204.3pkg:rpm/suse/xen&distro=SUSE%20Manager%20Server%204.3
< 4.17.5_04-150500.3.39.1+ 24 more
- (no CPE)range: < 4.17.5_04-150500.3.39.1
- (no CPE)range: < 4.18.3_04-150600.3.9.1
- (no CPE)range: < 4.17.5_04-150500.3.39.1
- (no CPE)range: < 4.19.0_04-1.1
- (no CPE)range: < 4.13.5_16-150200.3.99.1
- (no CPE)range: < 4.16.6_04-150400.4.62.1
- (no CPE)range: < 4.16.6_04-150400.4.62.1
- (no CPE)range: < 4.14.6_20-150300.3.81.1
- (no CPE)range: < 4.14.6_20-150300.3.81.1
- (no CPE)range: < 4.16.6_04-150400.4.62.1
- (no CPE)range: < 4.16.6_04-150400.4.62.1
- (no CPE)range: < 4.17.5_04-150500.3.39.1
- (no CPE)range: < 4.17.5_04-150500.3.39.1
- (no CPE)range: < 4.18.3_04-150600.3.9.1
- (no CPE)range: < 4.17.5_04-150500.3.39.1
- (no CPE)range: < 4.18.3_04-150600.3.9.1
- (no CPE)range: < 4.12.4_54-3.118.1
- (no CPE)range: < 4.13.5_16-150200.3.99.1
- (no CPE)range: < 4.16.6_04-150400.4.62.1
- (no CPE)range: < 4.12.4_54-3.118.1
- (no CPE)range: < 4.13.5_16-150200.3.99.1
- (no CPE)range: < 4.16.6_04-150400.4.62.1
- (no CPE)range: < 4.12.4_54-3.118.1
- (no CPE)range: < 4.16.6_04-150400.4.62.1
- (no CPE)range: < 4.16.6_04-150400.4.62.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.