Логотип exploitDog
bind: "CVE-2023-46842"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2023-46842"

Количество 11

Количество 11

ubuntu логотип

CVE-2023-46842

около 1 года назад

Unlike 32-bit PV guests, HVM guests may switch freely between 64-bit and other modes. This in particular means that they may set registers used to pass 32-bit-mode hypercall arguments to values outside of the range 32-bit code would be able to set them to. When processing of hypercalls takes a considerable amount of time, the hypervisor may choose to invoke a hypercall continuation. Doing so involves putting (perhaps updated) hypercall arguments in respective registers. For guests not running in 64-bit mode this further involves a certain amount of translation of the values. Unfortunately internal sanity checking of these translated values assumes high halves of registers to always be clear when invoking a hypercall. When this is found not to be the case, it triggers a consistency check in the hypervisor and causes a crash.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2023-46842

около 1 года назад

Unlike 32-bit PV guests, HVM guests may switch freely between 64-bit and other modes. This in particular means that they may set registers used to pass 32-bit-mode hypercall arguments to values outside of the range 32-bit code would be able to set them to. When processing of hypercalls takes a considerable amount of time, the hypervisor may choose to invoke a hypercall continuation. Doing so involves putting (perhaps updated) hypercall arguments in respective registers. For guests not running in 64-bit mode this further involves a certain amount of translation of the values. Unfortunately internal sanity checking of these translated values assumes high halves of registers to always be clear when invoking a hypercall. When this is found not to be the case, it triggers a consistency check in the hypervisor and causes a crash.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2023-46842

около 1 года назад

Unlike 32-bit PV guests, HVM guests may switch freely between 64-bit a ...

CVSS3: 6.5
EPSS: Низкий
redos логотип

ROS-20240916-09

9 месяцев назад

Уязвимость xen

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-hcr5-hp8w-36q9

около 1 года назад

Unlike 32-bit PV guests, HVM guests may switch freely between 64-bit and other modes. This in particular means that they may set registers used to pass 32-bit-mode hypercall arguments to values outside of the range 32-bit code would be able to set them to. When processing of hypercalls takes a considerable amount of time, the hypervisor may choose to invoke a hypercall continuation. Doing so involves putting (perhaps updated) hypercall arguments in respective registers. For guests not running in 64-bit mode this further involves a certain amount of translation of the values. Unfortunately internal sanity checking of these translated values assumes high halves of registers to always be clear when invoking a hypercall. When this is found not to be the case, it triggers a consistency check in the hypervisor and causes a crash.

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2024-07257

около 1 года назад

Уязвимость компонента x86 HVM Hypercall Handler кроссплатформенного гипервизора Xen ядра операционной системы Linux, позволяющая нарушителю получить вызвать отказ в обслуживании

CVSS3: 6.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2654-1

11 месяцев назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2531-1

12 месяцев назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1541-1

около 1 года назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1295-1

около 1 года назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2535-1

12 месяцев назад

Security update for xen

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-46842

Unlike 32-bit PV guests, HVM guests may switch freely between 64-bit and other modes. This in particular means that they may set registers used to pass 32-bit-mode hypercall arguments to values outside of the range 32-bit code would be able to set them to. When processing of hypercalls takes a considerable amount of time, the hypervisor may choose to invoke a hypercall continuation. Doing so involves putting (perhaps updated) hypercall arguments in respective registers. For guests not running in 64-bit mode this further involves a certain amount of translation of the values. Unfortunately internal sanity checking of these translated values assumes high halves of registers to always be clear when invoking a hypercall. When this is found not to be the case, it triggers a consistency check in the hypervisor and causes a crash.

CVSS3: 6.5
7%
Низкий
около 1 года назад
nvd логотип
CVE-2023-46842

Unlike 32-bit PV guests, HVM guests may switch freely between 64-bit and other modes. This in particular means that they may set registers used to pass 32-bit-mode hypercall arguments to values outside of the range 32-bit code would be able to set them to. When processing of hypercalls takes a considerable amount of time, the hypervisor may choose to invoke a hypercall continuation. Doing so involves putting (perhaps updated) hypercall arguments in respective registers. For guests not running in 64-bit mode this further involves a certain amount of translation of the values. Unfortunately internal sanity checking of these translated values assumes high halves of registers to always be clear when invoking a hypercall. When this is found not to be the case, it triggers a consistency check in the hypervisor and causes a crash.

CVSS3: 6.5
7%
Низкий
около 1 года назад
debian логотип
CVE-2023-46842

Unlike 32-bit PV guests, HVM guests may switch freely between 64-bit a ...

CVSS3: 6.5
7%
Низкий
около 1 года назад
redos логотип
ROS-20240916-09

Уязвимость xen

CVSS3: 6.5
7%
Низкий
9 месяцев назад
github логотип
GHSA-hcr5-hp8w-36q9

Unlike 32-bit PV guests, HVM guests may switch freely between 64-bit and other modes. This in particular means that they may set registers used to pass 32-bit-mode hypercall arguments to values outside of the range 32-bit code would be able to set them to. When processing of hypercalls takes a considerable amount of time, the hypervisor may choose to invoke a hypercall continuation. Doing so involves putting (perhaps updated) hypercall arguments in respective registers. For guests not running in 64-bit mode this further involves a certain amount of translation of the values. Unfortunately internal sanity checking of these translated values assumes high halves of registers to always be clear when invoking a hypercall. When this is found not to be the case, it triggers a consistency check in the hypervisor and causes a crash.

CVSS3: 6.5
7%
Низкий
около 1 года назад
fstec логотип
BDU:2024-07257

Уязвимость компонента x86 HVM Hypercall Handler кроссплатформенного гипервизора Xen ядра операционной системы Linux, позволяющая нарушителю получить вызвать отказ в обслуживании

CVSS3: 6.5
7%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2654-1

Security update for xen

11 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2531-1

Security update for xen

12 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:1541-1

Security update for xen

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:1295-1

Security update for xen

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2535-1

Security update for xen

12 месяцев назад

Уязвимостей на страницу