From 15968113a2e0eeb0e75e39000080ada3475c0cb2 Mon Sep 17 00:00:00 2001 From: Fernando Rodrigues Date: Tue, 9 Sep 2025 22:50:34 +1000 Subject: [PATCH] xen: patch with XSA-473 This patch only affects ARM, but it's better than setting ARM as knownVulnerabilities. Arm issues with page refcounting There are two issues related to the mapping of pages belonging to other domains: For one, an assertion is wrong there, where the case actually needs handling. A NULL pointer de-reference could result on a release build. This is CVE-2025-58144. And then the P2M lock isn't held until a page reference was actually obtained (or the attempt to do so has failed). Otherwise the page can not only change type, but even ownership in between, thus allowing domain boundaries to be violated. This is CVE-2025-58145. Signed-off-by: Fernando Rodrigues --- pkgs/by-name/xe/xen/package.nix | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/pkgs/by-name/xe/xen/package.nix b/pkgs/by-name/xe/xen/package.nix index ca36890f5904..830de3e1cbc5 100644 --- a/pkgs/by-name/xe/xen/package.nix +++ b/pkgs/by-name/xe/xen/package.nix @@ -199,6 +199,16 @@ stdenv.mkDerivation (finalAttrs: { url = "https://xenbits.xen.org/xsa/xsa472-3.patch"; hash = "sha256-rikOofQeuLNMBkdQS3xzmwh7BlgMOTMSsQcAOEzNOso="; }) + + # XSA 473 + (fetchpatch { + url = "https://xenbits.xen.org/xsa/xsa473-1.patch"; + hash = "sha256-594tTalWcGJSLj3++4QB/ADkHH1qJNrdvg7FG6kOuB8="; + }) + (fetchpatch { + url = "https://xenbits.xen.org/xsa/xsa473-2.patch"; + hash = "sha256-tGuIGxJFBXbckIruSUeTyrM6GabdIj6Pr3cVxeDvNNY="; + }) ]; outputs = [