x86/AMD:IOMMU 隔离页表级别不匹配 (CVE-2023-46835)
CVE编号
CVE-2023-46835利用情况
暂无补丁情况
N/A披露时间
2024-01-06漏洞描述
The current setup of the quarantine page tables assumes that the quarantine domain (dom_io) has been initialized with an address width of DEFAULT_DOMAIN_ADDRESS_WIDTH (48) and hence 4 page table levels. However dom_io being a PV domain gets the AMD-Vi IOMMU page tables levels based on the maximum (hot pluggable) RAM address, and hence on systems with no RAM above the 512GB mark only 3 page-table levels are configured in the IOMMU. On systems without RAM above the 512GB boundary amd_iommu_quarantine_init() will setup page tables for the scratch page with 4 levels, while the IOMMU will be configured to use 3 levels only, resulting in the last page table directory (PDE) effectively becoming a page table entry (PTE), and hence a device in quarantine mode gaining write access to the page destined to be a PDE. Due to this page table level mismatch, the sink page the device gets read/write access to is no longer cleared between device assignment, possibly leading to data leaks.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://xenbits.xenproject.org/xsa/advisory-445.html |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | alpine_3.15 | xen | * | Up to (excluding) 4.15.5-r3 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.16 | xen | * | Up to (excluding) 4.16.5-r4 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.17 | xen | * | Up to (excluding) 4.16.5-r4 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.18 | xen | * | Up to (excluding) 4.17.2-r4 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.19 | xen | * | Up to (excluding) 4.17.2-r4 | |||||
运行在以下环境 | |||||||||
系统 | debian_12 | xen | * | Up to (excluding) 4.17.2+76-ge1f9cb16e2-1~deb12u1 | |||||
运行在以下环境 | |||||||||
系统 | fedora_37 | xen | * | Up to (excluding) 4.16.5-4.fc37 | |||||
运行在以下环境 | |||||||||
系统 | fedora_38 | xen | * | Up to (excluding) 4.17.2-5.fc38 | |||||
运行在以下环境 | |||||||||
系统 | fedora_39 | xen | * | Up to (excluding) 4.17.2-5.fc39 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_5.3 | xen-libs | * | Up to (excluding) 4.16.5_08-150400.4.40.1 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_5.4 | xen-libs | * | Up to (excluding) 4.16.5_08-150400.4.40.1 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.4 | xen | * | Up to (excluding) 4.16.5_08-150400.4.40.1 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.5 | xen | * | Up to (excluding) 4.17.2_08-150500.3.15.1 | |||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | xen | * | Up to (excluding) 4.12.4_42-3.100.1 | |||||
- 攻击路径 N/A
- 攻击复杂度 N/A
- 权限要求 N/A
- 影响范围 N/A
- 用户交互 N/A
- 可用性 N/A
- 保密性 N/A
- 完整性 N/A
CWE-ID | 漏洞类型 |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论