DEBIAN-CVE-2023-46836

Source
https://security-tracker.debian.org/tracker/CVE-2023-46836
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-46836.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2023-46836
Upstream
Published
2024-01-05T17:15:11Z
Modified
2025-09-25T23:29:48.934615Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

The fixes for XSA-422 (Branch Type Confusion) and XSA-434 (Speculative Return Stack Overflow) are not IRQ-safe. It was believed that the mitigations always operated in contexts with IRQs disabled. However, the original XSA-254 fix for Meltdown (XPTI) deliberately left interrupts enabled on two entry paths; one unconditionally, and one conditionally on whether XPTI was active. As BTC/SRSO and Meltdown affect different CPU vendors, the mitigations are not active together by default. Therefore, there is a race condition whereby a malicious PV guest can bypass BTC/SRSO protections and launch a BTC/SRSO attack against Xen.

References

Affected packages

Debian:11 / xen

Package

Name
xen
Purl
pkg:deb/debian/xen?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.14.2+25-gb6a8c4f72d-2
4.14.3-1~deb11u1
4.14.3-1
4.14.3+32-g9de3671772-1~deb11u1
4.14.3+32-g9de3671772-1
4.14.4+74-gd7b22226b5-1
4.14.5+24-g87d90d511c-1
4.14.5+86-g1c354767d5-1
4.14.5+94-ge49571868d-1
4.14.6-1
4.16.0-1~exp1
4.16.0+51-g0941d6cb-1
4.16.1-1
4.16.2-1
4.16.2-2
4.16.2+90-g0d39a6d1ae-1
4.17.0~rc4-1~exp1
4.17.0-1
4.17.0+24-g2f8851c37f-2~exp1
4.17.0+24-g2f8851c37f-2
4.17.0+46-gaaf74a532c-1
4.17.0+74-g3eac216e6e-1
4.17.1+2-gb773c48e36-1
4.17.2-1
4.17.2+55-g0b56bed864-1
4.17.2+76-ge1f9cb16e2-1~deb12u1
4.17.2+76-ge1f9cb16e2-1
4.17.3+10-g091466ba55-1~deb12u1
4.17.3+10-g091466ba55-1
4.17.3+10-g091466ba55-1.1~exp1
4.17.3+10-g091466ba55-1.1~exp2
4.17.3+10-g091466ba55-1.1
4.17.3+36-g54dacb5c02-1
4.17.5+23-ga4e5191dc0-1
4.19.0+14-g0918434e0f-1~exp1
4.19.1-1~exp1
4.19.1-1~exp4
4.19.1-1
4.20.0~rc2+1-gfcde5e0de8-1~exp1
4.20.0-1
4.20.0+68-g35cb38b222-1

Ecosystem specific

{
    "urgency": "end-of-life"
}

Debian:12 / xen

Package

Name
xen
Purl
pkg:deb/debian/xen?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.17.2+76-ge1f9cb16e2-1~deb12u1

Affected versions

4.*

4.17.1+2-gb773c48e36-1
4.17.2-1
4.17.2+55-g0b56bed864-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / xen

Package

Name
xen
Purl
pkg:deb/debian/xen?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.17.2+76-ge1f9cb16e2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / xen

Package

Name
xen
Purl
pkg:deb/debian/xen?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.17.2+76-ge1f9cb16e2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}