Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2023-46836
HistoryJan 05, 2024 - 5:15 p.m.

CVE-2023-46836

2024-01-0517:15:11
Debian Security Bug Tracker
security-tracker.debian.org
12
xsa-422
xsa-434
branch type confusion
speculative return stack overflow
meltdown
xpti
cpu vendors
race condition
malicious guest
xen

4.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

6.2 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.0%

The fixes for XSA-422 (Branch Type Confusion) and XSA-434 (Speculative Return Stack Overflow) are not IRQ-safe. It was believed that the mitigations always operated in contexts with IRQs disabled. However, the original XSA-254 fix for Meltdown (XPTI) deliberately left interrupts enabled on two entry paths; one unconditionally, and one conditionally on whether XPTI was active. As BTC/SRSO and Meltdown affect different CPU vendors, the mitigations are not active together by default. Therefore, there is a race condition whereby a malicious PV guest can bypass BTC/SRSO protections and launch a BTC/SRSO attack against Xen.

OSVersionArchitecturePackageVersionFilename
Debian12allxen< 4.17.2+76-ge1f9cb16e2-1~deb12u1xen_4.17.2+76-ge1f9cb16e2-1~deb12u1_all.deb
Debian11allxen<= 4.14.6-1xen_4.14.6-1_all.deb
Debian999allxen< 4.17.2+76-ge1f9cb16e2-1xen_4.17.2+76-ge1f9cb16e2-1_all.deb
Debian13allxen< 4.17.2+76-ge1f9cb16e2-1xen_4.17.2+76-ge1f9cb16e2-1_all.deb

4.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

6.2 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.0%