CVE-2023-34319

CVSS v3.1 7.8 (High)
78% Progress
EPSS 0.04 % (5th)
0.04% Progress
Affected Products 3
Advisories 46
NVD Status Analyzed

The fix for XSA-423 added logic to Linux'es netback driver to deal with
a frontend splitting a packet in a way such that not all of the headers
would come in one piece. Unfortunately the logic introduced there
didn't account for the extreme case of the entire packet being split
into as many pieces as permitted by the protocol, yet still being
smaller than the area that's specially dealt with to keep all (possible)
headers together. Such an unusual packet would therefore trigger a
buffer overrun in the driver.

Weaknesses
CWE-787
Out-of-bounds Write
CVE Status
PUBLISHED
NVD Status
Analyzed
CNA
Xen Project
Published Date
2023-09-22 14:15:45
(12 months ago)
Updated Date
2024-06-26 15:54:52
(2 months ago)

Affected Products

Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Xen on X86 from 3.2.0 version cpe:2.3:o:xen:xen::*:*:*:*:*:x86 >= 3.2.0

Configuration #2

    CPE23 From Up To
  Debian Linux 10.0 cpe:2.3:o:debian:debian_linux:10.0

Configuration #3

    CPE23 From Up To
  Linux Kernel from 4.9.336 version and prior 4.10 version cpe:2.3:o:linux:linux_kernel >= 4.9.336 < 4.10
  Linux Kernel from 4.14.302 version and prior 4.14.321 version cpe:2.3:o:linux:linux_kernel >= 4.14.302 < 4.14.321
  Linux Kernel from 4.19.269 version and prior 4.19.290 version cpe:2.3:o:linux:linux_kernel >= 4.19.269 < 4.19.290
  Linux Kernel from 5.4.227 version and prior 5.4.252 version cpe:2.3:o:linux:linux_kernel >= 5.4.227 < 5.4.252
  Linux Kernel from 5.10.159 version and prior 5.10.189 version cpe:2.3:o:linux:linux_kernel >= 5.10.159 < 5.10.189
  Linux Kernel from 5.15.83 version and prior 5.15.125 version cpe:2.3:o:linux:linux_kernel >= 5.15.83 < 5.15.125
  Linux Kernel from 6.1.13 version and prior 6.1.44 version cpe:2.3:o:linux:linux_kernel >= 6.1.13 < 6.1.44
  Linux Kernel from 6.2 version and prior 6.4.9 version cpe:2.3:o:linux:linux_kernel >= 6.2 < 6.4.9
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...