Information

AdvisoryXSA-488
Public release 2026-04-17 17:02
Updated 2026-04-28 17:39
Version 2
CVE(s) CVE-2025-54505
Title x86: Floating Point Divider State Sampling

Files

advisory-488.txt (signed advisory file)
xsa488.patch
xsa488-4.17.patch
xsa488-4.18.patch
xsa488-4.20.patch

Advisory


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

            Xen Security Advisory CVE-2025-54505 / XSA-488
                              version 2

              x86: Floating Point Divider State Sampling

ISSUE DESCRIPTION
=================

Researchers from the CISPA Helmholtz Center for Information Security have
discovered Floating Point Divider State Sampling.  It is detailed in a paper
titled "TREVEX: A Black-Box Detection Framework For Data-Flow Transient
Execution Vulnerabilities"

For more information, see:
  https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7053.html
  https://roots.ec/blog/fpdss/

IMPACT
======

An attacker might be able to infer data belonging to other contexts,
including data belonging to other guests.

VULNERABLE SYSTEMS
==================

Systems running all versions of Xen are affected.

Only AMD Fam17h CPUs (Zen1 microarchitecture) are believed to be
vulnerable.  Other AMD CPUs and CPUs from other manufacturers are not
known to be affected.

MITIGATION
==========

There are no mitigations.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

Note that patches for released versions are generally prepared to
apply to the stable branches, and may not apply cleanly to the most
recent release tarball.  Downstreams are encouraged to update to the
tip of the stable branch before applying these patches.

xsa488.patch           xen-unstable - Xen 4.21.x
xsa488-4.20.patch      Xen 4.20.x - Xen 4.19.x
xsa488-4.18.patch      Xen 4.18.x
xsa488-4.17.patch      Xen 4.17.x

$ sha256sum xsa488*
3dde61413eb75cb65fbd20b58165f673f9f4610804ec532ff0bf3c3f469454c1  xsa488.patch
7822abb0ed5a5f8e2b8697db41d46e030fd69bf8ca8cb965022484b287d9ea26  xsa488-4.17.patch
6668f9d1433863522b8554dc324f57efcfcf3e00c9261c0ee5c2db17f63bccd6  xsa488-4.18.patch
275c35d05951c4583056904869183972b9699549f0ec59f946faa92d5cef4b21  xsa488-4.20.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patches and/or mitigations described above (or
others which are substantially similar) is permitted during the
embargo, even on public-facing systems with untrusted guest users and
administrators.

But: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.


(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAmnw8L0MHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZAZIH/iNPiCDUvJX3dnIiFrLXfoc1MLnbuJn2mGPZNufn
x3PbYPPahGsI4sCIxM593iconXAYg8R5zFYixahiP+uuParZkDKvRTAdzI/6bnZn
dGKS40c5M32LGHpSzxv5TWjp1KvVyPhImuMnSUkBLBu30Hbk+inn0uUKkUWSP3oV
ltGqXeugE7wF6s/mllFpkT3F1eIA4VN9CusZfb5/0mAlzgu15M0lXQd4uAl2DPMa
u4sqz3iTJlAhsfpek8tzPVnTbD72+4lEbgN1/bsBsOVNvoxzcOCl1WblVIaJ36RB
s3z50ZihIJ8zH6RgZU40WurQvB8XyCTItCXn2x4rNlKeQxE=
=w+M6
-----END PGP SIGNATURE-----


Xenproject.org Security Team