Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-58150

Опубликовано: 28 янв. 2026
Источник: debian
EPSS Низкий

Описание

Shadow mode tracing code uses a set of per-CPU variables to avoid cumbersome parameter passing. Some of these variables are written to with guest controlled data, of guest controllable size. That size can be larger than the variable, and bounding of the writes was missing.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xenunfixedpackage
xenpostponedtrixiepackage
xenpostponedbookwormpackage
xenend-of-lifebullseyepackage

Примечания

  • https://xenbits.xen.org/xsa/advisory-477.html

EPSS

Процентиль: 2%
0.00013
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
11 дней назад

Shadow mode tracing code uses a set of per-CPU variables to avoid cumbersome parameter passing. Some of these variables are written to with guest controlled data, of guest controllable size. That size can be larger than the variable, and bounding of the writes was missing.

CVSS3: 8.8
nvd
11 дней назад

Shadow mode tracing code uses a set of per-CPU variables to avoid cumbersome parameter passing. Some of these variables are written to with guest controlled data, of guest controllable size. That size can be larger than the variable, and bounding of the writes was missing.

CVSS3: 8.8
github
10 дней назад

Shadow mode tracing code uses a set of per-CPU variables to avoid cumbersome parameter passing. Some of these variables are written to with guest controlled data, of guest controllable size. That size can be larger than the variable, and bounding of the writes was missing.

suse-cvrf
11 дней назад

Security update for xen

suse-cvrf
12 дней назад

Security update for xen

EPSS

Процентиль: 2%
0.00013
Низкий