{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-34320","assignerOrgId":"23aa2041-22e1-471f-9209-9b7396fa234f","state":"PUBLISHED","assignerShortName":"XEN","dateReserved":"2023-06-01T10:44:17.064Z","datePublished":"2023-12-08T20:54:06.993Z","dateUpdated":"2025-11-04T19:16:33.356Z"},"containers":{"cna":{"title":"arm: Guests can trigger a deadlock on Cortex-A77","datePublic":"2023-08-01T14:44:00.000Z","descriptions":[{"lang":"en","value":"Cortex-A77 cores (r0p0 and r1p0) are affected by erratum 1508412\nwhere software, under certain circumstances, could deadlock a core\ndue to the execution of either a load to device or non-cacheable memory,\nand either a store exclusive or register read of the Physical\nAddress Register (PAR_EL1) in close proximity.\n"}],"impacts":[{"descriptions":[{"lang":"en","value":"A (malicious) guest that doesn't include the workaround for erratum\n1508412 could deadlock the core.  This will ultimately result to\na deadlock of the system.\n"}]}],"affected":[{"defaultStatus":"unknown","product":"Xen","vendor":"Xen","versions":[{"status":"unknown","version":"consult Xen advisory XSA-436"}]}],"configurations":[{"lang":"en","value":"Systems running all version of Xen are affected.\n\nThis bug is specific to Arm Cortex-A77 cores r0p0 and r1p0.\n"}],"workarounds":[{"lang":"en","value":"There are no known mitigations.\n"}],"references":[{"url":"https://xenbits.xenproject.org/xsa/advisory-436.html"}],"providerMetadata":{"orgId":"23aa2041-22e1-471f-9209-9b7396fa234f","shortName":"XEN","dateUpdated":"2023-12-08T20:54:06.993Z"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://xenbits.xenproject.org/xsa/advisory-436.html","tags":["x_transferred"]},{"url":"http://xenbits.xen.org/xsa/advisory-436.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-04T19:16:33.356Z"}}]}}