CVE-2024-31143
double unlock in x86 guest IRQ handling
Severity Score
Exploit Likelihood
Affected Versions
15Public Exploits
0Exploited in Wild
-Decision
Descriptions
An optional feature of PCI MSI called "Multiple Message" allows a
device to use multiple consecutive interrupt vectors. Unlike for MSI-X,
the setting up of these consecutive vectors needs to happen all in one
go. In this handling an error path could be taken in different
situations, with or without a particular lock held. This error path
wrongly releases the lock even when it is not currently held.
Una característica opcional de PCI MSI llamada "Mensaje múltiple" permite que un dispositivo utilice múltiples vectores de interrupción consecutivos. A diferencia de MSI-X, la configuración de estos vectores consecutivos debe realizarse de una sola vez. En este manejo se podría tomar una ruta de error en diferentes situaciones, con o sin un bloqueo particular mantenido. Esta ruta de error libera incorrectamente el bloqueo incluso cuando no está retenido actualmente.
An optional feature of PCI MSI called "Multiple Message" allows a device to use multiple consecutive interrupt vectors. Unlike for MSI-X, the setting up of these consecutive vectors needs to happen all in one go. In this handling an error path could be taken in different situations, with or without a particular lock held. This error path wrongly releases the lock even when it is not currently held.
Multiple vulnerabilities have been discovered in the Xen hypervisor, which could result in privilege escalation, denial of service or information leaks.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-03-28 CVE Reserved
- 2024-07-18 CVE Published
- 2024-09-13 CVE Updated
- 2025-04-15 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-832: Unlock of a Resource that is not Locked
CAPEC
References (1)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|