Vulnerability Details : CVE-2023-34321
Arm provides multiple helpers to clean & invalidate the cache
for a given region. This is, for instance, used when allocating
guest memory to ensure any writes (such as the ones during scrubbing)
have reached memory before handing over the page to a guest.
Unfortunately, the arithmetics in the helpers can overflow and would
then result to skip the cache cleaning/invalidation. Therefore there
is no guarantee when all the writes will reach the memory.
Vulnerability category: Overflow
Products affected by CVE-2023-34321
- cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*
Exploit prediction scoring system (EPSS) score for CVE-2023-34321
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 7 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-34321
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.3
|
LOW | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
1.8
|
1.4
|
NIST | 2024-01-11 |
CWE ids for CVE-2023-34321
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-34321
-
https://xenbits.xenproject.org/xsa/advisory-437.html
XSA-437 - Xen Security AdvisoriesPatch;Vendor Advisory
Jump to