Error Interrupt Recursion in x86's APIC Architecture Can Cause Deadlock
CVE-2024-45817

7.3HIGH

Key Information:

Vendor
CVE Published:
25 September 2024

What is CVE-2024-45817?

A vulnerability exists in the Advanced Programmable Interrupt Controller (APIC) architecture utilized by x86 systems within the Xen Hypervisor. Improper handling of error interrupts can lead to a recursive deadlock situation. Specifically, an illegal vector configuration for the error interrupt triggers a recursion through the vlapic_error() function, causing system instability. This recursion accumulates errors in the status register yet only generates an interrupt upon a new status bit setting. The lock managing this state can be improperly accessed recursively, leading to potential deadlock situations. System administrators should review their configurations and implement precautionary measures to mitigate risks associated with this vulnerability.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Xen consult Xen advisory XSA-462

References

CVSS V3.1

Score:
7.3
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

This issue was discovered after a BUGSENG team working on MISRA C compliance of Xen pointed attention to ECLAIR reports for MISRA C Rule 17.2 (Functions shall not call themselves, either directly or indirectly).
.