Vulnerability Details : CVE-2024-45819
PVH guests have their ACPI tables constructed by the toolstack. The
construction involves building the tables in local memory, which are
then copied into guest memory. While actually used parts of the local
memory are filled in correctly, excess space that is being allocated is
left with its prior contents.
Products affected by CVE-2024-45819
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2024-45819
0.02%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 4 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-45819
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2024-12-31 |
CWE ids for CVE-2024-45819
-
During installation, installed file permissions are set to allow anyone to modify those files.Assigned by: 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
References for CVE-2024-45819
-
http://www.openwall.com/lists/oss-security/2024/11/12/10
oss-security - Re: Xen Security Advisory 464 v2 (CVE-2024-45819) - libxl leaks data to PVH guests via ACPI tables
-
https://xenbits.xenproject.org/xsa/advisory-464.html
XSA-464 - Xen Security Advisories
-
http://www.openwall.com/lists/oss-security/2024/11/12/7
-
http://www.openwall.com/lists/oss-security/2024/11/12/1
-
http://xenbits.xen.org/xsa/advisory-464.html
Jump to