In x86's APIC (Advanced Programmable Interrupt Controller) architecture,
error conditions are reported in a status register. Furthermore, the OS
can opt to receive an interrupt when a new error occurs.
It is possible to configure the error interrupt with an illegal vector,
which generates an error when an error interrupt is raised.
This case causes Xen to recurse through vlapic_error(). The recursion
itself is bounded; errors accumulate in the the status register and only
generate an interrupt when a new status bit becomes set.
However, the lock protecting this state in Xen will try to be taken
recursively, and deadlock.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://xenbits.xenproject.org/xsa/advisory-462.html |
History
Wed, 20 Nov 2024 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-209 | |
Metrics |
cvssV3_1
|
Wed, 25 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 25 Sep 2024 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In x86's APIC (Advanced Programmable Interrupt Controller) architecture, error conditions are reported in a status register. Furthermore, the OS can opt to receive an interrupt when a new error occurs. It is possible to configure the error interrupt with an illegal vector, which generates an error when an error interrupt is raised. This case causes Xen to recurse through vlapic_error(). The recursion itself is bounded; errors accumulate in the the status register and only generate an interrupt when a new status bit becomes set. However, the lock protecting this state in Xen will try to be taken recursively, and deadlock. | |
Title | x86: Deadlock in vlapic_error() | |
References |
|
MITRE
Status: PUBLISHED
Assigner: XEN
Published: 2024-09-25T10:31:57.371Z
Updated: 2024-11-20T21:33:14.401Z
Reserved: 2024-09-09T14:43:11.826Z
Link: CVE-2024-45817
Vulnrichment
Updated: 2024-09-25T11:03:12.931Z
NVD
Status : Awaiting Analysis
Published: 2024-09-25T11:15:12.277
Modified: 2024-09-26T13:32:02.803
Link: CVE-2024-45817
Redhat
No data.