Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-46835— x86/AMD: mismatch in IOMMU quarantine page table levels

EPSS 0.09% · P25
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-46835

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
x86/AMD: mismatch in IOMMU quarantine page table levels
Source: NVD (National Vulnerability Database)
Vulnerability Description
The current setup of the quarantine page tables assumes that the quarantine domain (dom_io) has been initialized with an address width of DEFAULT_DOMAIN_ADDRESS_WIDTH (48) and hence 4 page table levels. However dom_io being a PV domain gets the AMD-Vi IOMMU page tables levels based on the maximum (hot pluggable) RAM address, and hence on systems with no RAM above the 512GB mark only 3 page-table levels are configured in the IOMMU. On systems without RAM above the 512GB boundary amd_iommu_quarantine_init() will setup page tables for the scratch page with 4 levels, while the IOMMU will be configured to use 3 levels only, resulting in the last page table directory (PDE) effectively becoming a page table entry (PTE), and hence a device in quarantine mode gaining write access to the page destined to be a PDE. Due to this page table level mismatch, the sink page the device gets read/write access to is no longer cleared between device assignment, possibly leading to data leaks.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Xen 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Xen是英国剑桥(Cambridge)大学的一款开源的虚拟机监视器产品。该产品能够使不同和不兼容的操作系统运行在同一台计算机上,并支持在运行时进行迁移,保证正常运行并且避免宕机。 Xen存在安全漏洞,该漏洞源于IOMMU隔离页表级别不匹配。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
XenXen consult Xen advisory XSA-445 -

II. Public POCs for CVE-2023-46835

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-46835

登录查看更多情报信息。

Same Patch Batch · Xen · 2024-01-05 · 10 CVEs total

CVE-2023-46837arm32: The cache may not be properly cleaned/invalidated (take two)
CVE-2023-46836x86: BTC/SRSO fixes not fully effective
CVE-2023-34327x86/AMD: Debug Mask handling
CVE-2023-34328x86/AMD: Debug Mask handling
CVE-2023-34325Multiple vulnerabilities in libfsimage disk handling
CVE-2023-34326x86/AMD: missing IOMMU TLB flushing
CVE-2023-34323xenstored: A transaction conflict can crash C Xenstored
CVE-2023-34322top-level shadow reference dropped too early for 64-bit PV guests
CVE-2023-34321arm32: The cache may not be properly cleaned/invalidated

IV. Related Vulnerabilities

V. Comments for CVE-2023-46835

No comments yet


Leave a comment