Lucene search

K
xenXen ProjectXSA-446
HistoryNov 14, 2023 - 12:00 p.m.

x86: BTC/SRSO fixes not fully effective

2023-11-1412:00:00
Xen Project
xenbits.xen.org
18
xen
x86
cpu
vulnerabilities
btc/srso
xsa-422
xsa-434
meltdown
speculative return stack overflow
branch type confusion
pv guest
amd
hygon.

4.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

ISSUE DESCRIPTION

The fixes for XSA-422 (Branch Type Confusion) and XSA-434 (Speculative Return Stack Overflow) are not IRQ-safe. It was believed that the mitigations always operated in contexts with IRQs disabled.
However, the original XSA-254 fix for Meltdown (XPTI) deliberately left interrupts enabled on two entry paths; one unconditionally, and one conditionally on whether XPTI was active.
As BTC/SRSO and Meltdown affect different CPU vendors, the mitigations are not active together by default. Therefore, there is a race condition whereby a malicious PV guest can bypass BTC/SRSO protections and launch a BTC/SRSO attack against Xen.

IMPACT

An attacker in a PV guest might be able to infer the contents of memory belonging to other guests.

VULNERABLE SYSTEMS

All versions of Xen are vulnerable.
Xen is only vulnerable in default configurations on AMD and Hygon CPUs.
Xen is not believed to be vulnerable in default configurations on CPUs from other hardware vendors.
Only PV guests can leverage the vulnerability.

CPENameOperatorVersion
xeneqany

4.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%