DEBIAN-CVE-2023-46842

Source
https://security-tracker.debian.org/tracker/CVE-2023-46842
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-46842.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2023-46842
Upstream
Published
2024-05-16T14:15:08Z
Modified
2025-10-10T19:30:24.223087Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Unlike 32-bit PV guests, HVM guests may switch freely between 64-bit and other modes. This in particular means that they may set registers used to pass 32-bit-mode hypercall arguments to values outside of the range 32-bit code would be able to set them to. When processing of hypercalls takes a considerable amount of time, the hypervisor may choose to invoke a hypercall continuation. Doing so involves putting (perhaps updated) hypercall arguments in respective registers. For guests not running in 64-bit mode this further involves a certain amount of translation of the values. Unfortunately internal sanity checking of these translated values assumes high halves of registers to always be clear when invoking a hypercall. When this is found not to be the case, it triggers a consistency check in the hypervisor and causes a crash.

References

Affected packages

Debian:11 / xen

Package

Name
xen
Purl
pkg:deb/debian/xen?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.14.2+25-gb6a8c4f72d-2
4.14.3-1~deb11u1
4.14.3-1
4.14.3+32-g9de3671772-1~deb11u1
4.14.3+32-g9de3671772-1
4.14.4+74-gd7b22226b5-1
4.14.5+24-g87d90d511c-1
4.14.5+86-g1c354767d5-1
4.14.5+94-ge49571868d-1
4.14.6-1
4.16.0-1~exp1
4.16.0+51-g0941d6cb-1
4.16.1-1
4.16.2-1
4.16.2-2
4.16.2+90-g0d39a6d1ae-1
4.17.0~rc4-1~exp1
4.17.0-1
4.17.0+24-g2f8851c37f-2~exp1
4.17.0+24-g2f8851c37f-2
4.17.0+46-gaaf74a532c-1
4.17.0+74-g3eac216e6e-1
4.17.1+2-gb773c48e36-1
4.17.2-1
4.17.2+55-g0b56bed864-1
4.17.2+76-ge1f9cb16e2-1~deb12u1
4.17.2+76-ge1f9cb16e2-1
4.17.3+10-g091466ba55-1~deb12u1
4.17.3+10-g091466ba55-1
4.17.3+10-g091466ba55-1.1~exp1
4.17.3+10-g091466ba55-1.1~exp2
4.17.3+10-g091466ba55-1.1
4.17.3+36-g54dacb5c02-1
4.17.5+23-ga4e5191dc0-1
4.19.0+14-g0918434e0f-1~exp1
4.19.1-1~exp1
4.19.1-1~exp4
4.19.1-1
4.20.0~rc2+1-gfcde5e0de8-1~exp1
4.20.0-1
4.20.0+68-g35cb38b222-1

Ecosystem specific

{
    "urgency": "end-of-life"
}

Debian:12 / xen

Package

Name
xen
Purl
pkg:deb/debian/xen?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.17.5+23-ga4e5191dc0-1

Affected versions

4.*

4.17.1+2-gb773c48e36-1
4.17.2-1
4.17.2+55-g0b56bed864-1
4.17.2+76-ge1f9cb16e2-1~deb12u1
4.17.2+76-ge1f9cb16e2-1
4.17.3+10-g091466ba55-1~deb12u1
4.17.3+10-g091466ba55-1
4.17.3+10-g091466ba55-1.1~exp1
4.17.3+10-g091466ba55-1.1~exp2
4.17.3+10-g091466ba55-1.1
4.17.3+36-g54dacb5c02-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / xen

Package

Name
xen
Purl
pkg:deb/debian/xen?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.19.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / xen

Package

Name
xen
Purl
pkg:deb/debian/xen?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.19.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}