CVE-2024-45817
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/09/2024
Last modified:
14/01/2026
Description
In x86&#39;s APIC (Advanced Programmable Interrupt Controller) architecture,<br />
error conditions are reported in a status register. Furthermore, the OS<br />
can opt to receive an interrupt when a new error occurs.<br />
<br />
It is possible to configure the error interrupt with an illegal vector,<br />
which generates an error when an error interrupt is raised.<br />
<br />
This case causes Xen to recurse through vlapic_error(). The recursion<br />
itself is bounded; errors accumulate in the the status register and only<br />
generate an interrupt when a new status bit becomes set.<br />
<br />
However, the lock protecting this state in Xen will try to be taken<br />
recursively, and deadlock.
Impact
Base Score 3.x
7.30
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:* | 4.5.0 (including) |
To consult the complete list of CPE names with products and versions, see this page



