Unlike 32-bit PV guests, HVM guests may switch freely between 64-bit and
other modes.  This in particular means that they may set registers used
to pass 32-bit-mode hypercall arguments to values outside of the range
32-bit code would be able to set them to.
When processing of hypercalls takes a considerable amount of time,
the hypervisor may choose to invoke a hypercall continuation.  Doing so
involves putting (perhaps updated) hypercall arguments in respective
registers.  For guests not running in 64-bit mode this further involves
a certain amount of translation of the values.
Unfortunately internal sanity checking of these translated values
assumes high halves of registers to always be clear when invoking a
hypercall.  When this is found not to be the case, it triggers a
consistency check in the hypervisor and causes a crash.
                
            References
                    Configurations
                    No configuration.
History
                    30 Apr 2025, 23:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
04 Dec 2024, 17:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-843 | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 6.5 | 
21 Nov 2024, 08:29
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://xenbits.xenproject.org/xsa/advisory-454.html - | |
| Summary | 
 | 
16 May 2024, 14:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-05-16 14:15
Updated : 2025-04-30 23:15
NVD link : CVE-2023-46842
Mitre link : CVE-2023-46842
CVE.ORG link : CVE-2023-46842
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-843
                        
            Access of Resource Using Incompatible Type ('Type Confusion')
