First published: Tue Nov 14 2023(Updated: )
The fixes for XSA-422 (Branch Type Confusion) and XSA-434 (Speculative Return Stack Overflow) are not IRQ-safe. It was believed that the mitigations always operated in contexts with IRQs disabled. However, the original XSA-254 fix for Meltdown (XPTI) deliberately left interrupts enabled on two entry paths; one unconditionally, and one conditionally on whether XPTI was active. As BTC/SRSO and Meltdown affect different CPU vendors, the mitigations are not active together by default. Therefore, there is a race condition whereby a malicious PV guest can bypass BTC/SRSO protections and launch a BTC/SRSO attack against Xen.
Credit: security@xen.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen XAPI |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-46836 is not explicitly rated but involves vulnerabilities affecting IRQ safety.
To fix CVE-2023-46836, apply the latest updates provided by the Xen project that address the IRQ safety issues.
CVS-2023-46836 affects the Xen unstable version as per the details available.
The risks associated with CVE-2023-46836 include potential exposure to branch type confusion and speculative execution attacks.
While CVE-2023-46836 is serious, its criticality depends on the context of use and specific deployment configurations.