CVE-2023-34322 — Improper Check for Dropped Privileges in XEN
Severity
7.8HIGHNVD
EPSS
0.1%
top 81.80%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 5
Description
For migration as well as to work around kernels unaware of L1TF (see
XSA-273), PV guests may be run in shadow paging mode. Since Xen itself
needs to be mapped when PV guests run, Xen and shadowed PV guests run
directly the respective shadow page tables. For 64-bit PV guests this
means running on the shadow of the guest root page table.
In the course of dealing with shortage of memory in the shadow pool
associated with a domain, shadows of page tables may be torn down. This
tearing down may incl…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages4 packages
🔴Vulnerability Details
3OSV▶
CVE-2023-34322: For migration as well as to work around kernels unaware of L1TF (see
XSA-273), PV guests may be run in shadow paging mode↗2024-01-05
GHSA▶
GHSA-3qxp-p56x-r4h3: For migration as well as to work around kernels unaware of L1TF (see
XSA-273), PV guests may be run in shadow paging mode↗2024-01-05
OSV▶
CVE-2023-34322: For migration as well as to work around kernels unaware of L1TF (see XSA-273), PV guests may be run in shadow paging mode↗2024-01-05
📋Vendor Advisories
1Debian▶
CVE-2023-34322: xen - For migration as well as to work around kernels unaware of L1TF (see XSA-273), P...↗2023