Vulnerability Description
The caching invalidation guidelines from the AMD-Vi specification (48882—Rev 3.07-PUB—Oct 2022) is incorrect on some hardware, as devices will malfunction (see stale DMA mappings) if some fields of the DTE are updated but the IOMMU TLB is not flushed. Such stale DMA mappings can point to memory ranges not owned by the guest, thus allowing access to unindented memory regions.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xen | Xen | All versions |
Related Weaknesses (CWE)
References
- https://xenbits.xenproject.org/xsa/advisory-442.htmlVendor Advisory
- http://xenbits.xen.org/xsa/advisory-442.html
- https://xenbits.xenproject.org/xsa/advisory-442.htmlVendor Advisory
FAQ
What is CVE-2023-34326?
CVE-2023-34326 is a vulnerability with a CVSS score of 7.8 (HIGH). The caching invalidation guidelines from the AMD-Vi specification (48882—Rev 3.07-PUB—Oct 2022) is incorrect on some hardware, as devices will malfunction (see stale DMA mappings) if some fields of th...
How severe is CVE-2023-34326?
CVE-2023-34326 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-34326?
Check the references section above for vendor advisories and patch information. Affected products include: Xen Xen.