CVE-2023-46838

7.5 HIGH
Published: January 29, 2024 Modified: November 04, 2025

Description

Transmit requests in Xen's virtual network protocol can consist of multiple parts. While not really useful, except for the initial part any of them may be of zero length, i.e. carry no data at all. Besides a certain initial portion of the to be transferred data, these parts are directly translated into what Linux calls SKB fragments. Such converted request parts can, when for a particular SKB they are all of length zero, lead to a de-reference of NULL in core networking code.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
Source: security@xen.org
Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
Source: security@xen.org
Mailing List Third Party Advisory
https://xenbits.xenproject.org/xsa/advisory-448.html
Source: security@xen.org
Patch Third Party Advisory
http://xenbits.xen.org/xsa/advisory-448.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
https://xenbits.xenproject.org/xsa/advisory-448.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory

11 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.5 / 10.0
EPSS (Exploit Probability)
0.1%
33th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

fedoraproject debian linux