Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-31143", "assignerOrgId": "23aa2041-22e1-471f-9209-9b7396fa234f", "state": "PUBLISHED", "assignerShortName": "XEN", "dateReserved": "2024-03-28T18:14:12.892Z", "datePublished": "2024-07-18T13:31:31.244Z", "dateUpdated": "2025-04-26T20:03:16.232Z"}, "containers": {"cna": {"title": "double unlock in x86 guest IRQ handling", "datePublic": "2024-07-16T11:59:00.000Z", "descriptions": [{"lang": "en", "value": "An optional feature of PCI MSI called \"Multiple Message\" allows a\ndevice to use multiple consecutive interrupt vectors. Unlike for MSI-X,\nthe setting up of these consecutive vectors needs to happen all in one\ngo. In this handling an error path could be taken in different\nsituations, with or without a particular lock held. This error path\nwrongly releases the lock even when it is not currently held.\n"}], "impacts": [{"descriptions": [{"lang": "en", "value": "Denial of Service (DoS) affecting the entire host, crashes, information\nleaks, or elevation of privilege all cannot be ruled out.\n"}]}], "affected": [{"defaultStatus": "unknown", "product": "Xen", "vendor": "Xen", "versions": [{"status": "unknown", "version": "consult Xen advisory XSA-458"}]}], "configurations": [{"lang": "en", "value": "Xen versions 4.4 and newer are vulnerable. Xen versions 4.3 and older\nare not vulnerable.\n\nOnly x86 guest which have a multi-vector MSI capable device passed\nthrough to them can leverage the vulnerability.\n"}], "workarounds": [{"lang": "en", "value": "Not passing through multi-vector MSI capable devices to x86 guests will\navoid the vulnerability.\n"}], "credits": [{"lang": "en", "type": "finder", "value": "This issue was discovered by Jan Beulich of SUSE.\n"}], "references": [{"url": "https://xenbits.xenproject.org/xsa/advisory-458.html"}], "providerMetadata": {"orgId": "23aa2041-22e1-471f-9209-9b7396fa234f", "shortName": "XEN", "dateUpdated": "2024-07-18T13:31:31.244Z"}}, "adp": [{"title": "CVE Program Container", "references": [{"url": "https://xenbits.xenproject.org/xsa/advisory-458.html", "tags": ["x_transferred"]}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/16/3"}, {"url": "http://xenbits.xen.org/xsa/advisory-458.html"}], "providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2025-04-26T20:03:16.232Z"}}, {"problemTypes": [{"descriptions": [{"type": "CWE", "cweId": "CWE-832", "lang": "en", "description": "CWE-832 Unlock of a Resource that is not Locked"}]}], "affected": [{"vendor": "xen", "product": "xen", "cpes": ["cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "4.4", "status": "affected", "lessThan": "4.16", "versionType": "custom"}]}], "metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}, {"other": {"type": "ssvc", "content": {"timestamp": "2024-08-21T13:31:44.467773Z", "id": "CVE-2024-31143", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-08-21T13:39:34.427Z"}}]}}