Количество 12
Количество 12
CVE-2023-46836
The fixes for XSA-422 (Branch Type Confusion) and XSA-434 (Speculative Return Stack Overflow) are not IRQ-safe. It was believed that the mitigations always operated in contexts with IRQs disabled. However, the original XSA-254 fix for Meltdown (XPTI) deliberately left interrupts enabled on two entry paths; one unconditionally, and one conditionally on whether XPTI was active. As BTC/SRSO and Meltdown affect different CPU vendors, the mitigations are not active together by default. Therefore, there is a race condition whereby a malicious PV guest can bypass BTC/SRSO protections and launch a BTC/SRSO attack against Xen.
CVE-2023-46836
The fixes for XSA-422 (Branch Type Confusion) and XSA-434 (Speculative Return Stack Overflow) are not IRQ-safe. It was believed that the mitigations always operated in contexts with IRQs disabled. However, the original XSA-254 fix for Meltdown (XPTI) deliberately left interrupts enabled on two entry paths; one unconditionally, and one conditionally on whether XPTI was active. As BTC/SRSO and Meltdown affect different CPU vendors, the mitigations are not active together by default. Therefore, there is a race condition whereby a malicious PV guest can bypass BTC/SRSO protections and launch a BTC/SRSO attack against Xen.
CVE-2023-46836
The fixes for XSA-422 (Branch Type Confusion) and XSA-434 (Speculative ...
GHSA-4rmw-8gh7-w6g3
The fixes for XSA-422 (Branch Type Confusion) and XSA-434 (Speculative Return Stack Overflow) are not IRQ-safe. It was believed that the mitigations always operated in contexts with IRQs disabled. However, the original XSA-254 fix for Meltdown (XPTI) deliberately left interrupts enabled on two entry paths; one unconditionally, and one conditionally on whether XPTI was active. As BTC/SRSO and Meltdown affect different CPU vendors, the mitigations are not active together by default. Therefore, there is a race condition whereby a malicious PV guest can bypass BTC/SRSO protections and launch a BTC/SRSO attack against Xen.
BDU:2023-08472
Уязвимость компонента IRQ Handler гипервизора Xen, позволяющая нарушителю раскрыть защищаемую информацию
SUSE-SU-2023:4945-1
Security update for xen
SUSE-SU-2023:4486-1
Security update for xen
SUSE-SU-2023:4485-1
Security update for xen
SUSE-SU-2023:4484-1
Security update for xen
SUSE-SU-2023:4466-1
Security update for xen
SUSE-SU-2023:4476-1
Security update for xen
SUSE-SU-2023:4475-1
Security update for xen
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-46836 The fixes for XSA-422 (Branch Type Confusion) and XSA-434 (Speculative Return Stack Overflow) are not IRQ-safe. It was believed that the mitigations always operated in contexts with IRQs disabled. However, the original XSA-254 fix for Meltdown (XPTI) deliberately left interrupts enabled on two entry paths; one unconditionally, and one conditionally on whether XPTI was active. As BTC/SRSO and Meltdown affect different CPU vendors, the mitigations are not active together by default. Therefore, there is a race condition whereby a malicious PV guest can bypass BTC/SRSO protections and launch a BTC/SRSO attack against Xen. | CVSS3: 4.7 | 0% Низкий | около 2 лет назад | |
CVE-2023-46836 The fixes for XSA-422 (Branch Type Confusion) and XSA-434 (Speculative Return Stack Overflow) are not IRQ-safe. It was believed that the mitigations always operated in contexts with IRQs disabled. However, the original XSA-254 fix for Meltdown (XPTI) deliberately left interrupts enabled on two entry paths; one unconditionally, and one conditionally on whether XPTI was active. As BTC/SRSO and Meltdown affect different CPU vendors, the mitigations are not active together by default. Therefore, there is a race condition whereby a malicious PV guest can bypass BTC/SRSO protections and launch a BTC/SRSO attack against Xen. | CVSS3: 4.7 | 0% Низкий | около 2 лет назад | |
CVE-2023-46836 The fixes for XSA-422 (Branch Type Confusion) and XSA-434 (Speculative ... | CVSS3: 4.7 | 0% Низкий | около 2 лет назад | |
GHSA-4rmw-8gh7-w6g3 The fixes for XSA-422 (Branch Type Confusion) and XSA-434 (Speculative Return Stack Overflow) are not IRQ-safe. It was believed that the mitigations always operated in contexts with IRQs disabled. However, the original XSA-254 fix for Meltdown (XPTI) deliberately left interrupts enabled on two entry paths; one unconditionally, and one conditionally on whether XPTI was active. As BTC/SRSO and Meltdown affect different CPU vendors, the mitigations are not active together by default. Therefore, there is a race condition whereby a malicious PV guest can bypass BTC/SRSO protections and launch a BTC/SRSO attack against Xen. | CVSS3: 4.7 | 0% Низкий | около 2 лет назад | |
BDU:2023-08472 Уязвимость компонента IRQ Handler гипервизора Xen, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 5.1 | 0% Низкий | около 2 лет назад | |
SUSE-SU-2023:4945-1 Security update for xen | около 2 лет назад | |||
SUSE-SU-2023:4486-1 Security update for xen | около 2 лет назад | |||
SUSE-SU-2023:4485-1 Security update for xen | около 2 лет назад | |||
SUSE-SU-2023:4484-1 Security update for xen | около 2 лет назад | |||
SUSE-SU-2023:4466-1 Security update for xen | около 2 лет назад | |||
SUSE-SU-2023:4476-1 Security update for xen | около 2 лет назад | |||
SUSE-SU-2023:4475-1 Security update for xen | около 2 лет назад |
Уязвимостей на страницу