CVE-2025-58142
Unknown
Unknown - Not Provided
BaseFortify
Publication date: 2025-09-11
Last updated on: 2025-11-04
Assigner: Xen Project
Description
Description
[This CNA information record relates to multiple CVEs; the
text explains which aspects/vulnerabilities correspond to which CVE.]
There are multiple issues related to the handling and accessing of guest
memory pages in the viridian code:
1. A NULL pointer dereference in the updating of the reference TSC area.
This is CVE-2025-27466.
2. A NULL pointer dereference by assuming the SIM page is mapped when
a synthetic timer message has to be delivered. This is
CVE-2025-58142.
3. A race in the mapping of the reference TSC page, where a guest can
get Xen to free a page while still present in the guest physical to
machine (p2m) page tables. This is CVE-2025-58143.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| xen | xen | From 4.13.0 (inc) to 4.17.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-395 | Catching NullPointerException should not be used as an alternative to programmatic checks to prevent dereferencing a null pointer. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
This vulnerability can cause a NULL pointer dereference, which may lead to a denial of service or system crash in the affected Xen environment when handling synthetic timer messages.
Can you explain this vulnerability to me?
CVE-2025-58142 is a vulnerability involving a NULL pointer dereference in the viridian code of Xen. It occurs because the code assumes that the SIM page is mapped when delivering a synthetic timer message, but this assumption can be incorrect, leading to a NULL pointer dereference.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70