Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-46836
HistoryJan 05, 2024 - 12:00 a.m.

CVE-2023-46836

2024-01-0500:00:00
ubuntu.com
ubuntu.com
19
xen
xsa-422
xsa-434
irq-safe
race condition
cpu vendors
meltdown
xpti
mitigations
pv guest

CVSS3

4.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

4.6

Confidence

High

EPSS

0

Percentile

9.0%

The fixes for XSA-422 (Branch Type Confusion) and XSA-434 (Speculative
Return Stack Overflow) are not IRQ-safe. It was believed that the
mitigations always operated in contexts with IRQs disabled. However, the
original XSA-254 fix for Meltdown (XPTI) deliberately left interrupts
enabled on two entry paths; one unconditionally, and one conditionally on
whether XPTI was active. As BTC/SRSO and Meltdown affect different CPU
vendors, the mitigations are not active together by default. Therefore,
there is a race condition whereby a malicious PV guest can bypass BTC/SRSO
protections and launch a BTC/SRSO attack against Xen.

Notes

Author Note
mdeslaur hypervisor packages are in universe. For issues in the hypervisor, add appropriate tags to each section, ex: Tags_xen: universe-binary

CVSS3

4.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

4.6

Confidence

High

EPSS

0

Percentile

9.0%