mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-01 19:21:37 +00:00
20 lines
1.1 KiB
JSON
20 lines
1.1 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2023-34324",
|
||
|
"sourceIdentifier": "security@xen.org",
|
||
|
"published": "2024-01-05T17:15:08.540",
|
||
|
"lastModified": "2024-01-05T18:23:44.497",
|
||
|
"vulnStatus": "Awaiting Analysis",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "Closing of an event channel in the Linux kernel can result in a deadlock.\nThis happens when the close is being performed in parallel to an unrelated\nXen console action and the handling of a Xen console interrupt in an\nunprivileged guest.\n\nThe closing of an event channel is e.g. triggered by removal of a\nparavirtual device on the other side. As this action will cause console\nmessages to be issued on the other side quite often, the chance of\ntriggering the deadlock is not neglectable.\n\nNote that 32-bit Arm-guests are not affected, as the 32-bit Linux kernel\non Arm doesn't use queued-RW-locks, which are required to trigger the\nissue (on Arm32 a waiting writer doesn't block further readers to get\nthe lock).\n"
|
||
|
}
|
||
|
],
|
||
|
"metrics": {},
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://xenbits.xenproject.org/xsa/advisory-441.html",
|
||
|
"source": "security@xen.org"
|
||
|
}
|
||
|
]
|
||
|
}
|