CVE-2023-34328 Affecting xen-tools-xendomains-wait-disk package, versions <4.17.2_06-150500.3.12.1


Severity

Recommended
0.0
medium
0
10

Based on SUSE Linux Enterprise Server security rating.

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-SLES155-XENTOOLSXENDOMAINSWAITDISK-5962405
  • published12 Oct 2023
  • disclosed12 Oct 2023

Introduced: 12 Oct 2023

CVE-2023-34328  (opens in a new tab)

How to fix?

Upgrade SLES:15.5 xen-tools-xendomains-wait-disk to version 4.17.2_06-150500.3.12.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream xen-tools-xendomains-wait-disk package and not the xen-tools-xendomains-wait-disk package as distributed by SLES. See How to fix? for SLES:15.5 relevant fixed versions and status.

[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.]

AMD CPUs since ~2014 have extensions to normal x86 debugging functionality. Xen supports guests using these extensions.

Unfortunately there are errors in Xen's handling of the guest state, leading to denials of service.

  1. CVE-2023-34327 - An HVM vCPU can end up operating in the context of a previous vCPUs debug mask state.

  2. CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT. This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock up the CPU entirely.

CVSS Scores

version 3.1