Unlike 32-bit PV guests, HVM guests may switch freely between 64-bit and
other modes. This in particular means that they may set registers used
to pass 32-bit-mode hypercall arguments to values outside of the range
32-bit code would be able to set them to.
When processing of hypercalls takes a considerable amount of time,
the hypervisor may choose to invoke a hypercall continuation. Doing so
involves putting (perhaps updated) hypercall arguments in respective
registers. For guests not running in 64-bit mode this further involves
a certain amount of translation of the values.
Unfortunately internal sanity checking of these translated values
assumes high halves of registers to always be clear when invoking a
hypercall. When this is found not to be the case, it triggers a
consistency check in the hypervisor and causes a crash.
References
| Link | Resource |
|---|---|
| https://xenbits.xenproject.org/xsa/advisory-454.html | Patch Vendor Advisory |
| http://xenbits.xen.org/xsa/advisory-454.html | Patch Vendor Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5OK6MH75S7YWD34EWW7QIZTS627RIE3/ | Mailing List Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYAZ7P6YFJ2E3FHKAGIKHWS46KYMMTZH/ | Mailing List Third Party Advisory |
| https://xenbits.xenproject.org/xsa/advisory-454.html | Patch Vendor Advisory |
Configurations
History
05 Jan 2026, 19:05
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://xenbits.xenproject.org/xsa/advisory-454.html - Patch, Vendor Advisory | |
| References | () http://xenbits.xen.org/xsa/advisory-454.html - Patch, Vendor Advisory | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5OK6MH75S7YWD34EWW7QIZTS627RIE3/ - Mailing List, Third Party Advisory | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYAZ7P6YFJ2E3FHKAGIKHWS46KYMMTZH/ - Mailing List, Third Party Advisory | |
| CPE | cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:* cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:* |
|
| First Time |
Xen
Fedoraproject fedora Xen xen Fedoraproject |
04 Nov 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
30 Apr 2025, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
04 Dec 2024, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-843 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
21 Nov 2024, 08:29
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References | () https://xenbits.xenproject.org/xsa/advisory-454.html - |
16 May 2024, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-05-16 14:15
Updated : 2026-01-05 19:05
NVD link : CVE-2023-46842
Mitre link : CVE-2023-46842
CVE.ORG link : CVE-2023-46842
JSON object : View
Products Affected
fedoraproject
- fedora
xen
- xen
CWE
CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
