From f6fd7105b5abe86345a2cdb7fede22e1c55dbc5f Mon Sep 17 00:00:00 2001 From: Fernando Rodrigues Date: Tue, 9 Sep 2025 22:50:34 +1000 Subject: [PATCH] xen: patch with XSA-473 This patch only affects ARM, but it's better than setting ARM as knownVulnerabilities. Arm issues with page refcounting There are two issues related to the mapping of pages belonging to other domains: For one, an assertion is wrong there, where the case actually needs handling. A NULL pointer de-reference could result on a release build. This is CVE-2025-58144. And then the P2M lock isn't held until a page reference was actually obtained (or the attempt to do so has failed). Otherwise the page can not only change type, but even ownership in between, thus allowing domain boundaries to be violated. This is CVE-2025-58145. Signed-off-by: Fernando Rodrigues (cherry picked from commit 15968113a2e0eeb0e75e39000080ada3475c0cb2) --- pkgs/by-name/xe/xen/package.nix | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/pkgs/by-name/xe/xen/package.nix b/pkgs/by-name/xe/xen/package.nix index b565f186902a..f8478b497a28 100644 --- a/pkgs/by-name/xe/xen/package.nix +++ b/pkgs/by-name/xe/xen/package.nix @@ -24,5 +24,15 @@ buildXenPackage.override { inherit python3Packages; } { url = "https://xenbits.xen.org/xsa/xsa472-3.patch"; hash = "sha256-rikOofQeuLNMBkdQS3xzmwh7BlgMOTMSsQcAOEzNOso="; }) + + # XSA 473 + (fetchpatch { + url = "https://xenbits.xen.org/xsa/xsa473-1.patch"; + hash = "sha256-594tTalWcGJSLj3++4QB/ADkHH1qJNrdvg7FG6kOuB8="; + }) + (fetchpatch { + url = "https://xenbits.xen.org/xsa/xsa473-2.patch"; + hash = "sha256-tGuIGxJFBXbckIruSUeTyrM6GabdIj6Pr3cVxeDvNNY="; + }) ]; }