Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2023-46835
HistoryJan 05, 2024 - 5:15 p.m.

CVE-2023-46835

2024-01-0517:15:11
Debian Security Bug Tracker
security-tracker.debian.org
24
quarantine
page tables
data leaks
iommu
configuration error
security vulnerability

7.5 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

8.7%

The current setup of the quarantine page tables assumes that the quarantine domain (dom_io) has been initialized with an address width of DEFAULT_DOMAIN_ADDRESS_WIDTH (48) and hence 4 page table levels. However dom_io being a PV domain gets the AMD-Vi IOMMU page tables levels based on the maximum (hot pluggable) RAM address, and hence on systems with no RAM above the 512GB mark only 3 page-table levels are configured in the IOMMU. On systems without RAM above the 512GB boundary amd_iommu_quarantine_init() will setup page tables for the scratch page with 4 levels, while the IOMMU will be configured to use 3 levels only, resulting in the last page table directory (PDE) effectively becoming a page table entry (PTE), and hence a device in quarantine mode gaining write access to the page destined to be a PDE. Due to this page table level mismatch, the sink page the device gets read/write access to is no longer cleared between device assignment, possibly leading to data leaks.

OSVersionArchitecturePackageVersionFilename
Debian12allxen< 4.17.2+76-ge1f9cb16e2-1~deb12u1xen_4.17.2+76-ge1f9cb16e2-1~deb12u1_all.deb
Debian11allxen<= 4.14.6-1xen_4.14.6-1_all.deb
Debian10allxen<= 4.11.4+107-gef32c7afa2-1xen_4.11.4+107-gef32c7afa2-1_all.deb
Debian999allxen< 4.17.2+76-ge1f9cb16e2-1xen_4.17.2+76-ge1f9cb16e2-1_all.deb
Debian13allxen< 4.17.2+76-ge1f9cb16e2-1xen_4.17.2+76-ge1f9cb16e2-1_all.deb

7.5 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

8.7%