Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-34327— x86/AMD: Debug Mask handling

EPSS 0.11% · P29
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-34327

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
x86/AMD: Debug Mask handling
Source: NVD (National Vulnerability Database)
Vulnerability Description
[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] AMD CPUs since ~2014 have extensions to normal x86 debugging functionality. Xen supports guests using these extensions. Unfortunately there are errors in Xen's handling of the guest state, leading to denials of service. 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of a previous vCPUs debug mask state. 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT. This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock up the CPU entirely.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Xen 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Xen是英国剑桥(Cambridge)大学的一款开源的虚拟机监视器产品。该产品能够使不同和不兼容的操作系统运行在同一台计算机上,并支持在运行时进行迁移,保证正常运行并且避免宕机。 Xen 存在安全漏洞,该漏洞源于允许HVM vCPU在以前的vCPU调试掩码状态。攻击者可利用该漏洞造成系统崩溃。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
XenXen consult Xen advisory XSA-444 -

II. Public POCs for CVE-2023-34327

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-34327

登录查看更多情报信息。

Same Patch Batch · Xen · 2024-01-05 · 10 CVEs total

CVE-2023-46837arm32: The cache may not be properly cleaned/invalidated (take two)
CVE-2023-46836x86: BTC/SRSO fixes not fully effective
CVE-2023-46835x86/AMD: mismatch in IOMMU quarantine page table levels
CVE-2023-34328x86/AMD: Debug Mask handling
CVE-2023-34325Multiple vulnerabilities in libfsimage disk handling
CVE-2023-34326x86/AMD: missing IOMMU TLB flushing
CVE-2023-34323xenstored: A transaction conflict can crash C Xenstored
CVE-2023-34322top-level shadow reference dropped too early for 64-bit PV guests
CVE-2023-34321arm32: The cache may not be properly cleaned/invalidated

IV. Related Vulnerabilities

V. Comments for CVE-2023-34327

No comments yet


Leave a comment