CVE-2024-45818 — Improper Locking in XEN
Severity
6.5MEDIUMNVD
EPSS
0.2%
top 57.62%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
1
Timeline
PublishedDec 19
Latest updateMar 7
Description
The hypervisor contains code to accelerate VGA memory accesses for HVM
guests, when the (virtual) VGA is in "standard" mode. Locking involved
there has an unusual discipline, leaving a lock acquired past the
return from the function that acquired it. This behavior results in a
problem when emulating an instruction with two memory accesses, both of
which touch VGA memory (plus some further constraints which aren't
relevant here). When emulating the 2nd access, the lock that is already
being held …
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:NExploitability: 2.0 | Impact: 4.0
Patches
🔴Vulnerability Details
4OSV▶
CVE-2024-45818: The hypervisor contains code to accelerate VGA memory accesses for HVM guests, when the (virtual) VGA is in "standard" mode↗2024-12-19
OSV▶
CVE-2024-45818: The hypervisor contains code to accelerate VGA memory accesses for HVM
guests, when the (virtual) VGA is in "standard" mode↗2024-12-19
GHSA▶
GHSA-9ppw-wh7x-2qc9: The hypervisor contains code to accelerate VGA memory accesses for HVM
guests, when the (virtual) VGA is in "standard" mode↗2024-12-19
📋Vendor Advisories
1Debian▶
CVE-2024-45818: xen - The hypervisor contains code to accelerate VGA memory accesses for HVM guests, w...↗2024