x86/AMD:调试掩码处理 (CVE-2023-34327)

CVE编号

CVE-2023-34327

利用情况

暂无

补丁情况

N/A

披露时间

2024-01-06
漏洞描述

[This CNA information record relates to multiple CVEs; the
text explains which aspects/vulnerabilities correspond to which CVE.]

AMD CPUs since ~2014 have extensions to normal x86 debugging functionality.
Xen supports guests using these extensions.

Unfortunately there are errors in Xen's handling of the guest state, leading
to denials of service.

1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of
a previous vCPUs debug mask state.

2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT.
This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock
up the CPU entirely.

解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 alpine_3.15 xen * Up to
(excluding)
4.15.5-r3
运行在以下环境
系统 alpine_3.16 xen * Up to
(excluding)
4.16.5-r3
运行在以下环境
系统 alpine_3.17 xen * Up to
(excluding)
4.16.5-r3
运行在以下环境
系统 alpine_3.18 xen * Up to
(excluding)
4.17.2-r3
运行在以下环境
系统 alpine_3.19 xen * Up to
(excluding)
4.17.2-r3
运行在以下环境
系统 debian_12 xen * Up to
(excluding)
4.17.2+76-ge1f9cb16e2-1~deb12u1
运行在以下环境
系统 fedora_37 xen * Up to
(excluding)
4.16.5-3.fc37
运行在以下环境
系统 fedora_38 xen * Up to
(excluding)
4.17.2-4.fc38
运行在以下环境
系统 fedora_39 xen * Up to
(excluding)
4.17.2-4.fc39
运行在以下环境
系统 opensuse_5.3 xen-libs * Up to
(excluding)
4.16.5_08-150400.4.40.1
运行在以下环境
系统 opensuse_5.4 xen-libs * Up to
(excluding)
4.16.5_08-150400.4.40.1
运行在以下环境
系统 opensuse_Leap_15.4 xen * Up to
(excluding)
4.16.5_06-150400.4.37.1
运行在以下环境
系统 opensuse_Leap_15.5 xen * Up to
(excluding)
4.17.2_06-150500.3.12.1
运行在以下环境
系统 suse_12_SP5 xen * Up to
(excluding)
4.12.4_40-3.97.1
运行在以下环境
系统 xen xen * From
(including)
4.5.0
CVSS3评分
5.5
  • 攻击路径
    本地
  • 攻击复杂度
  • 权限要求
  • 影响范围
    未更改
  • 用户交互
  • 可用性
  • 保密性
  • 完整性
CWE-ID 漏洞类型
NVD-CWE-noinfo
阿里云安全产品覆盖情况