x86:BTC/SRSO 修复不完全有效 (CVE-2023-46836)

CVE编号

CVE-2023-46836

利用情况

暂无

补丁情况

N/A

披露时间

2024-01-06
漏洞描述
The fixes for XSA-422 (Branch Type Confusion) and XSA-434 (Speculative
Return Stack Overflow) are not IRQ-safe. It was believed that the
mitigations always operated in contexts with IRQs disabled.

However, the original XSA-254 fix for Meltdown (XPTI) deliberately left
interrupts enabled on two entry paths; one unconditionally, and one
conditionally on whether XPTI was active.

As BTC/SRSO and Meltdown affect different CPU vendors, the mitigations
are not active together by default. Therefore, there is a race
condition whereby a malicious PV guest can bypass BTC/SRSO protections
and launch a BTC/SRSO attack against Xen.

解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 alpine_3.15 xen * Up to
(excluding)
4.15.5-r3
运行在以下环境
系统 alpine_3.16 xen * Up to
(excluding)
4.16.5-r4
运行在以下环境
系统 alpine_3.17 xen * Up to
(excluding)
4.16.5-r4
运行在以下环境
系统 alpine_3.18 xen * Up to
(excluding)
4.17.2-r4
运行在以下环境
系统 alpine_3.19 xen * Up to
(excluding)
4.17.2-r4
运行在以下环境
系统 debian_12 xen * Up to
(excluding)
4.17.2+76-ge1f9cb16e2-1~deb12u1
运行在以下环境
系统 fedora_37 xen * Up to
(excluding)
4.16.5-4.fc37
运行在以下环境
系统 fedora_38 xen * Up to
(excluding)
4.17.2-5.fc38
运行在以下环境
系统 fedora_39 xen * Up to
(excluding)
4.17.2-5.fc39
运行在以下环境
系统 opensuse_5.3 xen-libs * Up to
(excluding)
4.16.5_08-150400.4.40.1
运行在以下环境
系统 opensuse_5.4 xen-libs * Up to
(excluding)
4.16.5_08-150400.4.40.1
运行在以下环境
系统 opensuse_Leap_15.4 xen * Up to
(excluding)
4.16.5_08-150400.4.40.1
运行在以下环境
系统 opensuse_Leap_15.5 xen * Up to
(excluding)
4.17.2_08-150500.3.15.1
运行在以下环境
系统 suse_12_SP5 xen * Up to
(excluding)
4.12.4_42-3.100.1
运行在以下环境
系统 xen xen * -
CVSS3评分
4.7
  • 攻击路径
    本地
  • 攻击复杂度
  • 权限要求
  • 影响范围
    未更改
  • 用户交互
  • 可用性
  • 保密性
  • 完整性
CWE-ID 漏洞类型
NVD-CWE-noinfo
阿里云安全产品覆盖情况