When setting up interrupt remapping for legacy PCI(-X) devices,
including PCI(-X) bridges, a lookup of the upstream bridge is required.
This lookup, itself involving acquiring of a lock, is done in a context
where acquiring that lock is unsafe. This can lead to a deadlock.
References
| Link | Resource |
|---|---|
| https://xenbits.xenproject.org/xsa/advisory-467.html | Patch Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2025/02/27/1 | Mailing List Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2025/02/27/3 | Mailing List Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2025/02/28/1 | Mailing List Third Party Advisory |
| http://xenbits.xen.org/xsa/advisory-467.html | Patch Vendor Advisory |
Configurations
History
13 Jan 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://xenbits.xenproject.org/xsa/advisory-467.html - Patch, Vendor Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2025/02/27/1 - Mailing List, Third Party Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2025/02/27/3 - Mailing List, Third Party Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2025/02/28/1 - Mailing List, Third Party Advisory | |
| References | () http://xenbits.xen.org/xsa/advisory-467.html - Patch, Vendor Advisory | |
| Summary |
|
|
| First Time |
Xen
Xen xen |
|
| CPE | cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:* |
17 Jul 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-833 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
17 Jul 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-17 14:15
Updated : 2026-01-13 22:16
NVD link : CVE-2025-1713
Mitre link : CVE-2025-1713
CVE.ORG link : CVE-2025-1713
JSON object : View
Products Affected
xen
- xen
CWE
CWE-833
Deadlock
