Unlike 32-bit PV guests, HVM guests may switch freely between 64-bit and
other modes. This in particular means that they may set registers used
to pass 32-bit-mode hypercall arguments to values outside of the range
32-bit code would be able to set them to.
When processing of hypercalls takes a considerable amount of time,
the hypervisor may choose to invoke a hypercall continuation. Doing so
involves putting (perhaps updated) hypercall arguments in respective
registers. For guests not running in 64-bit mode this further involves
a certain amount of translation of the values.
Unfortunately internal sanity checking of these translated values
assumes high halves of registers to always be clear when invoking a
hypercall. When this is found not to be the case, it triggers a
consistency check in the hypervisor and causes a crash.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://xenbits.xenproject.org/xsa/advisory-454.html |
History
Wed, 04 Dec 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-843 | |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: XEN
Published: 2024-05-16T13:39:26.183Z
Updated: 2024-12-04T16:57:56.599Z
Reserved: 2023-10-27T07:55:35.333Z
Link: CVE-2023-46842
Vulnrichment
Updated: 2024-08-02T20:53:21.979Z
NVD
Status : Awaiting Analysis
Published: 2024-05-16T14:15:08.317
Modified: 2024-12-04T17:15:11.343
Link: CVE-2023-46842
Redhat
No data.