CVE-2024-45818

Deadlock in x86 HVM standard VGA handling

Description

The hypervisor contains code to accelerate VGA memory accesses for HVM guests, when the (virtual) VGA is in "standard" mode. Locking involved there has an unusual discipline, leaving a lock acquired past the return from the function that acquired it. This behavior results in a problem when emulating an instruction with two memory accesses, both of which touch VGA memory (plus some further constraints which aren't relevant here). When emulating the 2nd access, the lock that is already being held would be attempted to be re-acquired, resulting in a deadlock. This deadlock was already found when the code was first introduced, but was analysed incorrectly and the fix was incomplete. Analysis in light of the new finding cannot find a way to make the existing locking discipline work. In staging, this logic has all been removed because it was discovered to be accidentally disabled since Xen 4.7. Therefore, we are fixing the locking problem by backporting the removal of most of the feature. Note that even with the feature disabled, the lock would still be acquired for any accesses to the VGA MMIO region.

Remediation

Workaround:

  • Running only PV or PVH guests will avoid this vulnerability.

Category

6.5
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.02%
Vendor Advisory xenproject.org Vendor Advisory xen.org
Affected: Xen Xen
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-45818?
CVE-2024-45818 has been scored as a medium severity vulnerability.
How to fix CVE-2024-45818?
As a workaround for remediating CVE-2024-45818: Running only PV or PVH guests will avoid this vulnerability.
Is CVE-2024-45818 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-45818 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-45818?
CVE-2024-45818 affects Xen Xen.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.