Memory Access Permission Vulnerability in Libxl for Xen Project
CVE-2025-58149

7.5HIGH

Key Information:

Vendor
CVE Published:
31 October 2025

What is CVE-2025-58149?

This vulnerability arises from an oversight in the detach logic within Libxl, which fails to revoke access permissions for any 64-bit memory BARs when PCI devices are passed through. Consequently, a domain retains the ability to access these memory BARs even after the device has been detached. In the case of PV (paravirtualized) domains, the permission leak allows them to map the vulnerable memory directly in the page tables. For HVM (hardware virtual machine) domains, exploiting this leak necessitates a compromised device model or a stub domain to successfully map the leaked memory into the HVM domain’s physical-to-machine mapping.

Affected Version(s)

Xen consult Xen advisory XSA-476

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

This issue was discovered by Jiqian Chen of AMD and diagnosed as a security issue by Roger Pau Monné of XenServer.
.
CVE-2025-58149 : Memory Access Permission Vulnerability in Libxl for Xen Project