DEBIAN-CVE-2025-58149

Source
https://security-tracker.debian.org/tracker/CVE-2025-58149
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-58149.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2025-58149
Upstream
  • CVE-2025-58149
Downstream
Published
2025-10-31T12:15:35.143Z
Modified
2025-12-02T23:48:56.206348Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

When passing through PCI devices, the detach logic in libxl won't remove access permissions to any 64bit memory BARs the device might have. As a result a domain can still have access any 64bit memory BAR when such device is no longer assigned to the domain. For PV domains the permission leak allows the domain itself to map the memory in the page-tables. For HVM it would require a compromised device model or stubdomain to map the leaked memory into the HVM domain p2m.

References

Affected packages

Debian:11 / xen

Package

Name
xen
Purl
pkg:deb/debian/xen?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.14.2+25-gb6a8c4f72d-2
4.14.3-1~deb11u1
4.14.3-1
4.14.3+32-g9de3671772-1~deb11u1
4.14.3+32-g9de3671772-1
4.14.4+74-gd7b22226b5-1
4.14.5+24-g87d90d511c-1
4.14.5+86-g1c354767d5-1
4.14.5+94-ge49571868d-1
4.14.6-1
4.16.0-1~exp1
4.16.0+51-g0941d6cb-1
4.16.1-1
4.16.2-1
4.16.2-2
4.16.2+90-g0d39a6d1ae-1
4.17.0~rc4-1~exp1
4.17.0-1
4.17.0+24-g2f8851c37f-2~exp1
4.17.0+24-g2f8851c37f-2
4.17.0+46-gaaf74a532c-1
4.17.0+74-g3eac216e6e-1
4.17.1+2-gb773c48e36-1
4.17.2-1
4.17.2+55-g0b56bed864-1
4.17.2+76-ge1f9cb16e2-1~deb12u1
4.17.2+76-ge1f9cb16e2-1
4.17.3+10-g091466ba55-1~deb12u1
4.17.3+10-g091466ba55-1
4.17.3+10-g091466ba55-1.1~exp1
4.17.3+10-g091466ba55-1.1~exp2
4.17.3+10-g091466ba55-1.1
4.17.3+36-g54dacb5c02-1
4.17.5+23-ga4e5191dc0-1
4.17.5+72-g01140da4e8-1
4.19.0+14-g0918434e0f-1~exp1
4.19.1-1~exp1
4.19.1-1~exp4
4.19.1-1
4.20.0~rc2+1-gfcde5e0de8-1~exp1
4.20.0-1
4.20.0+68-g35cb38b222-1
4.20.2+7-g1badcf5035-1

Ecosystem specific

{
    "urgency": "end-of-life"
}

Debian:12 / xen

Package

Name
xen
Purl
pkg:deb/debian/xen?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.17.5+72-g01140da4e8-1

Affected versions

4.*

4.17.1+2-gb773c48e36-1
4.17.2-1
4.17.2+55-g0b56bed864-1
4.17.2+76-ge1f9cb16e2-1~deb12u1
4.17.2+76-ge1f9cb16e2-1
4.17.3+10-g091466ba55-1~deb12u1
4.17.3+10-g091466ba55-1
4.17.3+10-g091466ba55-1.1~exp1
4.17.3+10-g091466ba55-1.1~exp2
4.17.3+10-g091466ba55-1.1
4.17.3+36-g54dacb5c02-1
4.17.5+23-ga4e5191dc0-1
4.17.5+23-ga4e5191dc0-1+deb12u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / xen

Package

Name
xen
Purl
pkg:deb/debian/xen?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.20.2+7-g1badcf5035-0+deb13u1

Affected versions

4.*

4.20.0+68-g35cb38b222-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / xen

Package

Name
xen
Purl
pkg:deb/debian/xen?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.20.0+68-g35cb38b222-1
4.20.2+7-g1badcf5035-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}