Unlike 32-bit PV guests, HVM guests may switch freely between 64-bit and
other modes. This in particular means that they may set registers used
to pass 32-bit-mode hypercall arguments to values outside of the range
32-bit code would be able to set them to.
When processing of hypercalls takes a considerable amount of time,
the hypervisor may choose to invoke a hypercall continuation. Doing so
involves putting (perhaps updated) hypercall arguments in respective
registers. For guests not running in 64-bit mode this further involves
a certain amount of translation of the values.
Unfortunately internal sanity checking of these translated values
assumes high halves of registers to always be clear when invoking a
hypercall. When this is found not to be the case, it triggers a
consistency check in the hypervisor and causes a crash.
References
Configurations
No configuration.
History
30 Apr 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
04 Dec 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
CWE | CWE-843 |
21 Nov 2024, 08:29
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://xenbits.xenproject.org/xsa/advisory-454.html - |
16 May 2024, 15:44
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-16 14:15
Updated : 2025-04-30 23:15
NVD link : CVE-2023-46842
Mitre link : CVE-2023-46842
CVE.ORG link : CVE-2023-46842
JSON object : View
Products Affected
No product.
CWE
CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')