Количество 12
Количество 12
GHSA-9ppw-wh7x-2qc9
The hypervisor contains code to accelerate VGA memory accesses for HVM guests, when the (virtual) VGA is in "standard" mode. Locking involved there has an unusual discipline, leaving a lock acquired past the return from the function that acquired it. This behavior results in a problem when emulating an instruction with two memory accesses, both of which touch VGA memory (plus some further constraints which aren't relevant here). When emulating the 2nd access, the lock that is already being held would be attempted to be re-acquired, resulting in a deadlock. This deadlock was already found when the code was first introduced, but was analysed incorrectly and the fix was incomplete. Analysis in light of the new finding cannot find a way to make the existing locking discipline work. In staging, this logic has all been removed because it was discovered to be accidentally disabled since Xen 4.7. Therefore, we are fixing the locking problem by backporting the removal of most of the f...

CVE-2024-45818
The hypervisor contains code to accelerate VGA memory accesses for HVM guests, when the (virtual) VGA is in "standard" mode. Locking involved there has an unusual discipline, leaving a lock acquired past the return from the function that acquired it. This behavior results in a problem when emulating an instruction with two memory accesses, both of which touch VGA memory (plus some further constraints which aren't relevant here). When emulating the 2nd access, the lock that is already being held would be attempted to be re-acquired, resulting in a deadlock. This deadlock was already found when the code was first introduced, but was analysed incorrectly and the fix was incomplete. Analysis in light of the new finding cannot find a way to make the existing locking discipline work. In staging, this logic has all been removed because it was discovered to be accidentally disabled since Xen 4.7. Therefore, we are fixing the locking problem by backporting the removal of most of the f...

CVE-2024-45818
The hypervisor contains code to accelerate VGA memory accesses for HVM guests, when the (virtual) VGA is in "standard" mode. Locking involved there has an unusual discipline, leaving a lock acquired past the return from the function that acquired it. This behavior results in a problem when emulating an instruction with two memory accesses, both of which touch VGA memory (plus some further constraints which aren't relevant here). When emulating the 2nd access, the lock that is already being held would be attempted to be re-acquired, resulting in a deadlock. This deadlock was already found when the code was first introduced, but was analysed incorrectly and the fix was incomplete. Analysis in light of the new finding cannot find a way to make the existing locking discipline work. In staging, this logic has all been removed because it was discovered to be accidentally disabled since Xen 4.7. Therefore, we are fixing the locking problem by backporting the removal of most of the feat
CVE-2024-45818
The hypervisor contains code to accelerate VGA memory accesses for HVM ...

BDU:2025-01008
Уязвимость гипервизора Xen, связанная с неправильной блокировкой, позволяющая нарушителю вызвать отказ в обслуживании

SUSE-SU-2024:4116-1
Security update for xen

SUSE-SU-2024:3979-1
Security update for xen

SUSE-SU-2024:3977-1
Security update for xen

SUSE-SU-2024:4163-1
Security update for xen

SUSE-SU-2024:4073-1
Security update for xen

SUSE-SU-2024:3980-1
Security update for xen

ROS-20250128-02
Множественные уязвимости xen
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-9ppw-wh7x-2qc9 The hypervisor contains code to accelerate VGA memory accesses for HVM guests, when the (virtual) VGA is in "standard" mode. Locking involved there has an unusual discipline, leaving a lock acquired past the return from the function that acquired it. This behavior results in a problem when emulating an instruction with two memory accesses, both of which touch VGA memory (plus some further constraints which aren't relevant here). When emulating the 2nd access, the lock that is already being held would be attempted to be re-acquired, resulting in a deadlock. This deadlock was already found when the code was first introduced, but was analysed incorrectly and the fix was incomplete. Analysis in light of the new finding cannot find a way to make the existing locking discipline work. In staging, this logic has all been removed because it was discovered to be accidentally disabled since Xen 4.7. Therefore, we are fixing the locking problem by backporting the removal of most of the f... | CVSS3: 6.5 | 0% Низкий | 6 месяцев назад | |
![]() | CVE-2024-45818 The hypervisor contains code to accelerate VGA memory accesses for HVM guests, when the (virtual) VGA is in "standard" mode. Locking involved there has an unusual discipline, leaving a lock acquired past the return from the function that acquired it. This behavior results in a problem when emulating an instruction with two memory accesses, both of which touch VGA memory (plus some further constraints which aren't relevant here). When emulating the 2nd access, the lock that is already being held would be attempted to be re-acquired, resulting in a deadlock. This deadlock was already found when the code was first introduced, but was analysed incorrectly and the fix was incomplete. Analysis in light of the new finding cannot find a way to make the existing locking discipline work. In staging, this logic has all been removed because it was discovered to be accidentally disabled since Xen 4.7. Therefore, we are fixing the locking problem by backporting the removal of most of the f... | CVSS3: 6.5 | 0% Низкий | 6 месяцев назад |
![]() | CVE-2024-45818 The hypervisor contains code to accelerate VGA memory accesses for HVM guests, when the (virtual) VGA is in "standard" mode. Locking involved there has an unusual discipline, leaving a lock acquired past the return from the function that acquired it. This behavior results in a problem when emulating an instruction with two memory accesses, both of which touch VGA memory (plus some further constraints which aren't relevant here). When emulating the 2nd access, the lock that is already being held would be attempted to be re-acquired, resulting in a deadlock. This deadlock was already found when the code was first introduced, but was analysed incorrectly and the fix was incomplete. Analysis in light of the new finding cannot find a way to make the existing locking discipline work. In staging, this logic has all been removed because it was discovered to be accidentally disabled since Xen 4.7. Therefore, we are fixing the locking problem by backporting the removal of most of the feat | CVSS3: 6.5 | 0% Низкий | 6 месяцев назад |
CVE-2024-45818 The hypervisor contains code to accelerate VGA memory accesses for HVM ... | CVSS3: 6.5 | 0% Низкий | 6 месяцев назад | |
![]() | BDU:2025-01008 Уязвимость гипервизора Xen, связанная с неправильной блокировкой, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 6.5 | 0% Низкий | 6 месяцев назад |
![]() | SUSE-SU-2024:4116-1 Security update for xen | 7 месяцев назад | ||
![]() | SUSE-SU-2024:3979-1 Security update for xen | 7 месяцев назад | ||
![]() | SUSE-SU-2024:3977-1 Security update for xen | 7 месяцев назад | ||
![]() | SUSE-SU-2024:4163-1 Security update for xen | 7 месяцев назад | ||
![]() | SUSE-SU-2024:4073-1 Security update for xen | 7 месяцев назад | ||
![]() | SUSE-SU-2024:3980-1 Security update for xen | 7 месяцев назад | ||
![]() | ROS-20250128-02 Множественные уязвимости xen | CVSS3: 6.5 | 5 месяцев назад |
Уязвимостей на страницу