First published: Tue Sep 05 2023(Updated: )
Arm provides multiple helpers to clean & invalidate the cache for a given region. This is, for instance, used when allocating guest memory to ensure any writes (such as the ones during scrubbing) have reached memory before handing over the page to a guest. Unfortunately, the arithmetics in the helpers can overflow and would then result to skip the cache cleaning/invalidation. Therefore there is no guarantee when all the writes will reach the memory.
Credit: security@xen.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | <=4.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-34321 is classified as moderate.
To fix CVE-2023-34321, update to a fixed version of Xen that addresses the vulnerability.
CVE-2023-34321 affects Xen versions up to and including 4.16.
CVE-2023-34321 can potentially be exploited through guest memory allocation attacks.
Yes, CVE-2023-34321 is specifically related to the x86 architecture.