Bug 2408824 (CVE-2025-58148) - CVE-2025-58148 xen: x86: Incorrect input sanitisation in Viridian hypercalls
Summary: CVE-2025-58148 xen: x86: Incorrect input sanitisation in Viridian hypercalls
Keywords:
Status: NEW
Alias: CVE-2025-58148
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2413410 2413411 2413412
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-10-31 12:01 UTC by OSIDB Bzimport
Modified: 2025-11-10 16:51 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-10-31 12:01:55 UTC
[This CNA information record relates to multiple CVEs; the
text explains which aspects/vulnerabilities correspond to which CVE.]

Some Viridian hypercalls can specify a mask of vCPU IDs as an input, in
one of three formats.  Xen has boundary checking bugs with all three
formats, which can cause out-of-bounds reads and writes while processing
the inputs.

 * CVE-2025-58147.  Hypercalls using the HV_VP_SET Sparse format can
   cause vpmask_set() to write out of bounds when converting the bitmap
   to Xen's format.

 * CVE-2025-58148.  Hypercalls using any input format can cause
   send_ipi() to read d->vcpu[] out-of-bounds, and operate on a wild
   vCPU pointer.


Note You need to log in before you can comment on or make changes to this bug.