Shadow mode tracing code uses a set of per-CPU variables to avoid
cumbersome parameter passing. Some of these variables are written to
with guest controlled data, of guest controllable size. That size can
be larger than the variable, and bounding of the writes was missing.
References
| Link | Resource |
|---|---|
| https://xenbits.xenproject.org/xsa/advisory-477.html | Mitigation Patch Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2026/01/27/1 | Mailing List Mitigation Patch Third Party Advisory |
| http://xenbits.xen.org/xsa/advisory-477.html | Mailing List Patch Vendor Advisory |
Configurations
History
09 Feb 2026, 19:13
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Xen
Xen xen |
|
| CPE | cpe:2.3:o:xen:xen:-:*:*:*:*:*:x86:* | |
| References | () https://xenbits.xenproject.org/xsa/advisory-477.html - Mitigation, Patch, Vendor Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2026/01/27/1 - Mailing List, Mitigation, Patch, Third Party Advisory | |
| References | () http://xenbits.xen.org/xsa/advisory-477.html - Mailing List, Patch, Vendor Advisory |
28 Jan 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-787 | |
| References |
|
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
28 Jan 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-28 16:16
Updated : 2026-02-09 19:13
NVD link : CVE-2025-58150
Mitre link : CVE-2025-58150
CVE.ORG link : CVE-2025-58150
JSON object : View
Products Affected
xen
- xen
CWE
CWE-787
Out-of-bounds Write
