The current setup of the quarantine page tables assumes that the
quarantine domain (dom_io) has been initialized with an address width
of DEFAULT_DOMAIN_ADDRESS_WIDTH (48) and hence 4 page table levels.
However dom_io being a PV domain gets the AMD-Vi IOMMU page tables
levels based on the maximum (hot pluggable) RAM address, and hence on
systems with no RAM above the 512GB mark only 3 page-table levels are
configured in the IOMMU.
On systems without RAM above the 512GB boundary
amd_iommu_quarantine_init() will setup page tables for the scratch
page with 4 levels, while the IOMMU will be configured to use 3 levels
only, resulting in the last page table directory (PDE) effectively
becoming a page table entry (PTE), and hence a device in quarantine
mode gaining write access to the page destined to be a PDE.
Due to this page table level mismatch, the sink page the device gets
read/write access to is no longer cleared between device assignment,
possibly leading to data leaks.
References
Link | Resource |
---|---|
https://xenbits.xenproject.org/xsa/advisory-445.html | Patch Vendor Advisory |
https://xenbits.xenproject.org/xsa/advisory-445.html | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 08:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://xenbits.xenproject.org/xsa/advisory-445.html - Patch, Vendor Advisory |
11 Jan 2024, 15:56
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:* | |
First Time |
Xen
Xen xen |
|
References | () https://xenbits.xenproject.org/xsa/advisory-445.html - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | NVD-CWE-noinfo |
05 Jan 2024, 18:23
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-05 17:15
Updated : 2024-11-21 08:29
NVD link : CVE-2023-46835
Mitre link : CVE-2023-46835
CVE.ORG link : CVE-2023-46835
JSON object : View
Products Affected
xen
- xen
CWE