CVE-2023-34328 Affecting xen-libs package, versions <4.12.4_40-150100.3.95.1


Severity

Recommended
0.0
medium
0
10

Based on SUSE Linux Enterprise Server security rating.

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-SLES151-XENLIBS-6033921
  • published25 Oct 2023
  • disclosed24 Oct 2023

Introduced: 24 Oct 2023

CVE-2023-34328  (opens in a new tab)

How to fix?

Upgrade SLES:15.1 xen-libs to version 4.12.4_40-150100.3.95.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream xen-libs package and not the xen-libs package as distributed by SLES. See How to fix? for SLES:15.1 relevant fixed versions and status.

[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.]

AMD CPUs since ~2014 have extensions to normal x86 debugging functionality. Xen supports guests using these extensions.

Unfortunately there are errors in Xen's handling of the guest state, leading to denials of service.

  1. CVE-2023-34327 - An HVM vCPU can end up operating in the context of a previous vCPUs debug mask state.

  2. CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT. This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock up the CPU entirely.

CVSS Scores

version 3.1