CVE-2023-34328 Affecting xen package, versions <4.17.2+55-g0b56bed864-1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN13-XEN-5954760
  • published11 Oct 2023
  • disclosed5 Jan 2024

Introduced: 11 Oct 2023

CVE-2023-34328  (opens in a new tab)

How to fix?

Upgrade Debian:13 xen to version 4.17.2+55-g0b56bed864-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream xen package and not the xen package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.]

AMD CPUs since ~2014 have extensions to normal x86 debugging functionality. Xen supports guests using these extensions.

Unfortunately there are errors in Xen's handling of the guest state, leading to denials of service.

  1. CVE-2023-34327 - An HVM vCPU can end up operating in the context of a previous vCPUs debug mask state.

  2. CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT. This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock up the CPU entirely.

CVSS Scores

version 3.1