home  bbs  files  messages ]

      ZZLI4416             linux.debian.bugs.dist             15094 messages      

[ previous | next | reply ]

[ list messages | list forums ]

  Msg # 15083 of 15094 on ZZLI4416, Wednesday 11-04-25, 9:10  
  From: SALVATORE BONACCORSO  
  To: ALL  
  Subj: Bug#1120075: xen: CVE-2025-27465 CVE-202  
 CVE- 
 CVE- 
 20: 
 devel@lists. 
 reportbug@ 
 From: carnil@debian.org 
  
 Source: xen 
 Version: 4.20.0+68-g35cb38b222-1 
 Severity: grave 
 Tags: security upstream 
 Justification: user security hole 
 X-Debbugs-Cc: carnil@debian.org, Debian Security Team  
  
 Hi, 
  
 The following vulnerabilities were published for xen. 
  
 CVE-2025-27465[0]: 
 | Certain instructions need intercepting and emulating by Xen.  In 
 | some cases Xen emulates the instruction by replaying it, using an 
 | executable stub.  Some instructions may raise an exception, which is 
 | supposed to be handled gracefully.  Certain replayed instructions 
 | have additional logic to set up and recover the changes to the 
 | arithmetic flags.  For replayed instructions where the flags 
 | recovery logic is used, the metadata for exception handling was 
 | incorrect, preventing Xen from handling the the exception 
 | gracefully, treating it as fatal instead. 
  
  
 CVE-2025-27466[1]: 
 | [This CNA information record relates to multiple CVEs; the text 
 | explains which aspects/vulnerabilities correspond to which CVE.] 
 | There are multiple issues related to the handling and accessing of 
 | guest memory pages in the viridian code:   1. A NULL pointer 
 | dereference in the updating of the reference TSC area.     This is 
 | CVE-2025-27466.   2. A NULL pointer dereference by assuming the SIM 
 | page is mapped when     a synthetic timer message has to be 
 | delivered.  This is     CVE-2025-58142.   3. A race in the mapping 
 | of the reference TSC page, where a guest can     get Xen to free a 
 | page while still present in the guest physical to     machine (p2m) 
 | page tables.  This is CVE-2025-58143. 
  
  
 CVE-2025-58142[2]: 
 | [This CNA information record relates to multiple CVEs; the text 
 | explains which aspects/vulnerabilities correspond to which CVE.] 
 | There are multiple issues related to the handling and accessing of 
 | guest memory pages in the viridian code:   1. A NULL pointer 
 | dereference in the updating of the reference TSC area.     This is 
 | CVE-2025-27466.   2. A NULL pointer dereference by assuming the SIM 
 | page is mapped when     a synthetic timer message has to be 
 | delivered.  This is     CVE-2025-58142.   3. A race in the mapping 
 | of the reference TSC page, where a guest can     get Xen to free a 
 | page while still present in the guest physical to     machine (p2m) 
 | page tables.  This is CVE-2025-58143. 
  
  
 CVE-2025-58143[3]: 
 | [This CNA information record relates to multiple CVEs; the text 
 | explains which aspects/vulnerabilities correspond to which CVE.] 
 | There are multiple issues related to the handling and accessing of 
 | guest memory pages in the viridian code:   1. A NULL pointer 
 | dereference in the updating of the reference TSC area.     This is 
 | CVE-2025-27466.   2. A NULL pointer dereference by assuming the SIM 
 | page is mapped when     a synthetic timer message has to be 
 | delivered.  This is     CVE-2025-58142.   3. A race in the mapping 
 | of the reference TSC page, where a guest can     get Xen to free a 
 | page while still present in the guest physical to     machine (p2m) 
 | page tables.  This is CVE-2025-58143. 
  
  
 CVE-2025-58144[4]: 
 | [This CNA information record relates to multiple CVEs; the text 
 | explains which aspects/vulnerabilities correspond to which CVE.] 
 | There are two issues related to the mapping of pages belonging to 
 | other domains: For one, an assertion is wrong there, where the case 
 | actually needs handling.  A NULL pointer de-reference could result 
 | on a release build.  This is CVE-2025-58144.  And then the P2M lock 
 | isn't held until a page reference was actually obtained (or the 
 | attempt to do so has failed).  Otherwise the page can not only 
 | change type, but even ownership in between, thus allowing domain 
 | boundaries to be violated.  This is CVE-2025-58145. 
  
  
 CVE-2025-58145[5]: 
 | [This CNA information record relates to multiple CVEs; the text 
 | explains which aspects/vulnerabilities correspond to which CVE.] 
 | There are two issues related to the mapping of pages belonging to 
 | other domains: For one, an assertion is wrong there, where the case 
 | actually needs handling.  A NULL pointer de-reference could result 
 | on a release build.  This is CVE-2025-58144.  And then the P2M lock 
 | isn't held until a page reference was actually obtained (or the 
 | attempt to do so has failed).  Otherwise the page can not only 
 | change type, but even ownership in between, thus allowing domain 
 | boundaries to be violated.  This is CVE-2025-58145. 
  
  
 CVE-2025-58147[6]: 
 | [This CNA information record relates to multiple CVEs; the text 
 | explains which aspects/vulnerabilities correspond to which CVE.] 
 | Some Viridian hypercalls can specify a mask of vCPU IDs as an input, 
 | in one of three formats.  Xen has boundary checking bugs with all 
 | three formats, which can cause out-of-bounds reads and writes while 
 | processing the inputs.   * CVE-2025-58147.  Hypercalls using the 
 | HV_VP_SET Sparse format can    cause vpmask_set() to write out of 
 | bounds when converting the bitmap    to Xen's format.   * 
 | CVE-2025-58148.  Hypercalls using any input format can cause 
 | send_ipi() to read d->vcpu[] out-of-bounds, and operate on a wild 
 | vCPU pointer. 
  
  
 CVE-2025-58148[7]: 
 | [This CNA information record relates to multiple CVEs; the text 
 | explains which aspects/vulnerabilities correspond to which CVE.] 
 | Some Viridian hypercalls can specify a mask of vCPU IDs as an input, 
 | in one of three formats.  Xen has boundary checking bugs with all 
 | three formats, which can cause out-of-bounds reads and writes while 
 | processing the inputs.   * CVE-2025-58147.  Hypercalls using the 
 | HV_VP_SET Sparse format can    cause vpmask_set() to write out of 
 | bounds when converting the bitmap    to Xen's format.   * 
 | CVE-2025-58148.  Hypercalls using any input format can cause 
 | send_ipi() to read d->vcpu[] out-of-bounds, and operate on a wild 
 | vCPU pointer. 
  
  
 CVE-2025-58149[8]: 
 | When passing through PCI devices, the detach logic in libxl won't 
  
 [continued in next message] 
  
 --- SoupGate-Win32 v1.05 
  * Origin: you cannot sedate... all the things you hate (1:229/2) 
    

[ list messages | list forums | previous | next | reply ]

search for:

328,104 visits
(c) 1994,  bbs@darkrealms.ca