{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T08:09:09.077","vulnerabilities":[{"cve":{"id":"CVE-2024-31145","sourceIdentifier":"security@xen.org","published":"2024-09-25T11:15:12.133","lastModified":"2026-01-05T18:51:50.087","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Certain PCI devices in a system might be assigned Reserved Memory\nRegions (specified via Reserved Memory Region Reporting, \"RMRR\") for\nIntel VT-d or Unity Mapping ranges for AMD-Vi.  These are typically used\nfor platform tasks such as legacy USB emulation.\n\nSince the precise purpose of these regions is unknown, once a device\nassociated with such a region is active, the mappings of these regions\nneed to remain continuouly accessible by the device.  In the logic\nestablishing these mappings, error handling was flawed, resulting in\nsuch mappings to potentially remain in place when they should have been\nremoved again.  Respective guests would then gain access to memory\nregions which they aren't supposed to have access to."},{"lang":"es","value":"Ciertos dispositivos PCI de un sistema se les pueden asignar regiones de memoria reservadas (especificadas a través de informes de regiones de memoria reservadas, \"RMRR\") para Intel VT-d o rangos de mapeo de Unity para AMD-Vi. Por lo general, se utilizan para tareas de plataforma como la emulación USB heredada. Dado que se desconoce el propósito preciso de estas regiones, una vez que un dispositivo asociado con dicha región está activo, las asignaciones de estas regiones deben permanecer accesibles continuamente para el dispositivo. En la lógica que establece estas asignaciones, el manejo de errores era defectuoso, lo que resultó en que dichas asignaciones potencialmente permanecieran en su lugar cuando deberían haberse eliminado nuevamente. Los invitados respectivos obtendrían entonces acceso a regiones de memoria a las que se supone que no deberían tener acceso."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.8,"impactScore":6.0}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-400"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*","versionStartIncluding":"4.0.0","matchCriteriaId":"06663CA9-DD05-46D3-872D-A5102E1B3E96"}]}]}],"references":[{"url":"https://xenbits.xenproject.org/xsa/advisory-460.html","source":"security@xen.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2024/08/14/2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http://xenbits.xen.org/xsa/advisory-460.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}