Shadow mode tracing code uses a set of per-CPU variables to avoid
cumbersome parameter passing. Some of these variables are written to
with guest controlled data, of guest controllable size. That size can
be larger than the variable, and bounding of the writes was missing.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

Running HVM guests in HAP mode only will avoid the vulnerability. Not enabling tracing will also avoid the vulnerability. Tracing is enabled by the "tbuf_size=" command line option, or by running tools like xentrace or xenbaked in Dom0. Note that on a running system stopping xentrace / xenbaked would disable tracing. For xentrace, however, this additionally requires that it wasn't started with the -x option. Stopping previously enabled tracing can of course only prevent future damage; prior damage may have occurred and may manifest only later.

History

Wed, 28 Jan 2026 17:30:00 +0000


Wed, 28 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 28 Jan 2026 16:00:00 +0000

Type Values Removed Values Added
Description Shadow mode tracing code uses a set of per-CPU variables to avoid cumbersome parameter passing. Some of these variables are written to with guest controlled data, of guest controllable size. That size can be larger than the variable, and bounding of the writes was missing.
Title x86: buffer overrun with shadow paging + tracing
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: XEN

Published:

Updated: 2026-01-28T16:46:04.355Z

Reserved: 2025-08-26T06:48:41.444Z

Link: CVE-2025-58150

cve-icon Vulnrichment

Updated: 2026-01-28T16:11:53.448Z

cve-icon NVD

Status : Received

Published: 2026-01-28T16:16:12.880

Modified: 2026-01-28T17:16:07.150

Link: CVE-2025-58150

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses