First published: Tue Oct 10 2023(Updated: )
The caching invalidation guidelines from the AMD-Vi specification (48882—Rev 3.07-PUB—Oct 2022) is incorrect on some hardware, as devices will malfunction (see stale DMA mappings) if some fields of the DTE are updated but the IOMMU TLB is not flushed. Such stale DMA mappings can point to memory ranges not owned by the guest, thus allowing access to unindented memory regions.
Credit: security@xen.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-34326 has been classified as a high-severity vulnerability due to the potential for stale DMA mappings leading to device malfunctions.
To mitigate CVE-2023-34326, ensure that your system is updated according to the latest Xen security advisories and guidelines.
CVE-2023-34326 affects the Xen hypervisor, specifically the xen-unstable version.
Stale DMA mappings refer to outdated Direct Memory Access mappings that can cause devices to malfunction if not properly updated in accordance with IOMMU flushing.
Currently, a specific workaround for CVE-2023-34326 is not mentioned, so following the official patches and updates is recommended.