CVE-2025-58150
Unknown Unknown - Not Provided
Buffer Overflow in Xen Shadow Mode Tracing Enables Data Corruption

Publication date: 2026-01-28

Last updated on: 2026-02-09

Assigner: Xen Project

Description
Shadow mode tracing code uses a set of per-CPU variables to avoid cumbersome parameter passing. Some of these variables are written to with guest controlled data, of guest controllable size. That size can be larger than the variable, and bounding of the writes was missing.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-28
Last Modified
2026-02-09
Generated
2026-05-07
AI Q&A
2026-01-29
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
xen xen *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves shadow mode tracing code that uses per-CPU variables to avoid complex parameter passing. Some of these variables are written with data controlled by the guest, and the size of this data can be larger than the variable itself. There was no bounding on these writes, which means the guest can write more data than intended, potentially causing memory corruption or other unintended behavior.


How can this vulnerability impact me? :

The vulnerability can lead to serious impacts including high confidentiality, integrity, and availability risks. Because guest-controlled data can overwrite per-CPU variables without proper bounds checking, it may allow an attacker to execute arbitrary code, cause system crashes, or escalate privileges, thereby compromising the affected system.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart