{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-34324","assignerOrgId":"23aa2041-22e1-471f-9209-9b7396fa234f","state":"PUBLISHED","assignerShortName":"XEN","dateReserved":"2023-06-01T10:44:17.065Z","datePublished":"2024-01-05T16:30:45.807Z","dateUpdated":"2025-11-04T19:16:37.667Z"},"containers":{"cna":{"title":"Possible deadlock in Linux kernel event handling","datePublic":"2023-10-10T11:26:00.000Z","descriptions":[{"lang":"en","value":"Closing of an event channel in the Linux kernel can result in a deadlock.\nThis happens when the close is being performed in parallel to an unrelated\nXen console action and the handling of a Xen console interrupt in an\nunprivileged guest.\n\nThe closing of an event channel is e.g. triggered by removal of a\nparavirtual device on the other side. As this action will cause console\nmessages to be issued on the other side quite often, the chance of\ntriggering the deadlock is not neglectable.\n\nNote that 32-bit Arm-guests are not affected, as the 32-bit Linux kernel\non Arm doesn't use queued-RW-locks, which are required to trigger the\nissue (on Arm32 a waiting writer doesn't block further readers to get\nthe lock)."}],"impacts":[{"descriptions":[{"lang":"en","value":"A (malicious) guest administrator could cause a denial of service (DoS)\nin a backend domain (other than dom0) by disabling a paravirtualized\ndevice.\n\nA malicious backend could cause DoS in a guest running a Linux kernel by\ndisabling a paravirtualized device."}]}],"affected":[{"defaultStatus":"unknown","product":"Linux","vendor":"Linux","versions":[{"status":"unknown","version":"consult Xen advisory XSA-441"}]}],"configurations":[{"lang":"en","value":"All unprivileged guests running a Linux kernel of version 5.10 and later,\nor with the fixes for XSA-332, are vulnerable.\n\nAll guest types are vulnerable.\n\nOnly x86- and 64-bit Arm-guests are vulnerable.\n\nArm-guests running in 32-bit mode are not vulnerable.\n\nGuests not using paravirtualized drivers are not vulnerable."}],"workarounds":[{"lang":"en","value":"There is no known mitigation."}],"credits":[{"lang":"en","type":"finder","value":"This issue was discovered as a bug by Marek Marczykowski-Górecki of\nInvisible Things Lab; the security impact was recognised by Jürgen\nGroß of SUSE."}],"references":[{"url":"https://xenbits.xenproject.org/xsa/advisory-441.html"},{"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"},{"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html"}],"providerMetadata":{"orgId":"23aa2041-22e1-471f-9209-9b7396fa234f","shortName":"XEN","dateUpdated":"2024-01-11T19:07:16.495Z"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://xenbits.xenproject.org/xsa/advisory-441.html","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html","tags":["x_transferred"]},{"url":"http://xenbits.xen.org/xsa/advisory-441.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-04T19:16:37.667Z"}},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-400","lang":"en","description":"CWE-400 Uncontrolled Resource Consumption"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":4.9,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"HIGH","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-01-18T18:58:19.635975Z","id":"CVE-2023-34324","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-05T19:41:10.736Z"}}]}}