Vulnerability Description
[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] There are multiple issues related to the handling and accessing of guest memory pages in the viridian code: 1. A NULL pointer dereference in the updating of the reference TSC area. This is CVE-2025-27466. 2. A NULL pointer dereference by assuming the SIM page is mapped when a synthetic timer message has to be delivered. This is CVE-2025-58142. 3. A race in the mapping of the reference TSC page, where a guest can get Xen to free a page while still present in the guest physical to machine (p2m) page tables. This is CVE-2025-58143.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xen | Xen | >= 4.13.0, < 4.17.0 |
Related Weaknesses (CWE)
References
- https://xenbits.xenproject.org/xsa/advisory-472.htmlVendor Advisory
- http://www.openwall.com/lists/oss-security/2025/09/09/1
- http://xenbits.xen.org/xsa/advisory-472.html
FAQ
What is CVE-2025-58142?
CVE-2025-58142 is a vulnerability with a CVSS score of 9.8 (CRITICAL). [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] There are multiple issues related to the handling and accessing of gue...
How severe is CVE-2025-58142?
CVE-2025-58142 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-58142?
Check the references section above for vendor advisories and patch information. Affected products include: Xen Xen.