Description
[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Some Viridian hypercalls can specify a mask of vCPU IDs as an input, in one of three formats. Xen has boundary checking bugs with all three formats, which can cause out-of-bounds reads and writes while processing the inputs. * CVE-2025-58147. Hypercalls using the HV_VP_SET Sparse format can cause vpmask_set() to write out of bounds when converting the bitmap to Xen's format. * CVE-2025-58148. Hypercalls using any input format can cause send_ipi() to read d->vcpu[] out-of-bounds, and operate on a wild vCPU pointer.
References (3)
Core 3
Core References
Patch, Vendor Advisory
https://xenbits.xenproject.org/xsa/advisory-475.html
Mailing List, Patch, Third Party Advisory
http://www.openwall.com/lists/oss-security/2025/10/21/1
Patch, Vendor Advisory
http://xenbits.xen.org/xsa/advisory-475.html
Scores
CVSS v3
7.5
EPSS
0.0003
EPSS Percentile
7.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-125
Status
published
Products (1)
xen/xen
4.15.0
Published
Oct 31, 2025
Tracked Since
Feb 18, 2026