Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-23553 (GCVE-0-2026-23553)
Vulnerability from cvelistv5 – Published: 2026-01-28 15:33 – Updated: 2026-01-28 16:41{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2026-01-28T16:12:31.841Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2026/01/27/3"
},
{
"url": "http://xenbits.xen.org/xsa/advisory-479.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 2.9,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2026-23553",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-28T16:40:38.385640Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-665",
"description": "CWE-665 Improper Initialization",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-693",
"description": "CWE-693 Protection Mechanism Failure",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-28T16:41:14.803Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Xen",
"vendor": "Xen",
"versions": [
{
"status": "unknown",
"version": "consult Xen advisory XSA-479"
}
]
}
],
"configurations": [
{
"lang": "en",
"value": "Xen versions which had the XSA-254 fixes backported are vulnerable.\nUpstream, that is 4.6 and newer.\n\nOnly x86 systems are vulnerable. Arm systems are not vulerable.\n\nSystems vulnerable to SRSO (see XSA-434) with default settings use\nIBPB-on-entry to protect against SRSO. This is a rather more aggressive\nform of flushing than only on context switch, and is believed to be\nsufficient to avoid the vulnerability."
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "This issue was discovered by David Kaplan of AMD."
}
],
"datePublic": "2026-01-27T12:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "In the context switch logic Xen attempts to skip an IBPB in the case of\na vCPU returning to a CPU on which it was the previous vCPU to run.\nWhile safe for Xen\u0027s isolation between vCPUs, this prevents the guest\nkernel correctly isolating between tasks. Consider:\n\n 1) vCPU runs on CPU A, running task 1.\n 2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB.\n 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB.\n 4) vCPU moves back to CPU A. Xen skips IBPB again.\n\nNow, task 2 is running on CPU A with task 1\u0027s training still in the BTB."
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "Guest processes may leverage information leaks to obtain information\nintended to be private to other entities in a guest."
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-28T15:33:44.782Z",
"orgId": "23aa2041-22e1-471f-9209-9b7396fa234f",
"shortName": "XEN"
},
"references": [
{
"url": "https://xenbits.xenproject.org/xsa/advisory-479.html"
}
],
"title": "x86: incomplete IBPB for vCPU isolation",
"workarounds": [
{
"lang": "en",
"value": "Using \"spec-ctrl=ibpb-entry=hvm,ibpb-entry=pv\" on the Xen command line\nwill activate the SRSO mitigation on non-SRSO-vulnerable hardware, but\nit is a large overhead."
}
]
}
},
"cveMetadata": {
"assignerOrgId": "23aa2041-22e1-471f-9209-9b7396fa234f",
"assignerShortName": "XEN",
"cveId": "CVE-2026-23553",
"datePublished": "2026-01-28T15:33:44.782Z",
"dateReserved": "2026-01-14T13:07:36.961Z",
"dateUpdated": "2026-01-28T16:41:14.803Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2026-23553\",\"sourceIdentifier\":\"security@xen.org\",\"published\":\"2026-01-28T16:16:16.853\",\"lastModified\":\"2026-01-29T16:31:00.867\",\"vulnStatus\":\"Undergoing Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the context switch logic Xen attempts to skip an IBPB in the case of\\na vCPU returning to a CPU on which it was the previous vCPU to run.\\nWhile safe for Xen\u0027s isolation between vCPUs, this prevents the guest\\nkernel correctly isolating between tasks. Consider:\\n\\n 1) vCPU runs on CPU A, running task 1.\\n 2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB.\\n 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB.\\n 4) vCPU moves back to CPU A. Xen skips IBPB again.\\n\\nNow, task 2 is running on CPU A with task 1\u0027s training still in the BTB.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":2.9,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.4,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-665\"},{\"lang\":\"en\",\"value\":\"CWE-693\"}]}],\"references\":[{\"url\":\"https://xenbits.xenproject.org/xsa/advisory-479.html\",\"source\":\"security@xen.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2026/01/27/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://xenbits.xen.org/xsa/advisory-479.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2026/01/27/3\"}, {\"url\": \"http://xenbits.xen.org/xsa/advisory-479.html\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2026-01-28T16:12:31.841Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 2.9, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-23553\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-01-28T16:40:38.385640Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-665\", \"description\": \"CWE-665 Improper Initialization\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-693\", \"description\": \"CWE-693 Protection Mechanism Failure\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-01-28T16:39:51.548Z\"}}], \"cna\": {\"title\": \"x86: incomplete IBPB for vCPU isolation\", \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"This issue was discovered by David Kaplan of AMD.\"}], \"impacts\": [{\"descriptions\": [{\"lang\": \"en\", \"value\": \"Guest processes may leverage information leaks to obtain information\\nintended to be private to other entities in a guest.\"}]}], \"affected\": [{\"vendor\": \"Xen\", \"product\": \"Xen\", \"versions\": [{\"status\": \"unknown\", \"version\": \"consult Xen advisory XSA-479\"}], \"defaultStatus\": \"unknown\"}], \"datePublic\": \"2026-01-27T12:00:00.000Z\", \"references\": [{\"url\": \"https://xenbits.xenproject.org/xsa/advisory-479.html\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Using \\\"spec-ctrl=ibpb-entry=hvm,ibpb-entry=pv\\\" on the Xen command line\\nwill activate the SRSO mitigation on non-SRSO-vulnerable hardware, but\\nit is a large overhead.\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the context switch logic Xen attempts to skip an IBPB in the case of\\na vCPU returning to a CPU on which it was the previous vCPU to run.\\nWhile safe for Xen\u0027s isolation between vCPUs, this prevents the guest\\nkernel correctly isolating between tasks. Consider:\\n\\n 1) vCPU runs on CPU A, running task 1.\\n 2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB.\\n 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB.\\n 4) vCPU moves back to CPU A. Xen skips IBPB again.\\n\\nNow, task 2 is running on CPU A with task 1\u0027s training still in the BTB.\"}], \"configurations\": [{\"lang\": \"en\", \"value\": \"Xen versions which had the XSA-254 fixes backported are vulnerable.\\nUpstream, that is 4.6 and newer.\\n\\nOnly x86 systems are vulnerable. Arm systems are not vulerable.\\n\\nSystems vulnerable to SRSO (see XSA-434) with default settings use\\nIBPB-on-entry to protect against SRSO. This is a rather more aggressive\\nform of flushing than only on context switch, and is believed to be\\nsufficient to avoid the vulnerability.\"}], \"providerMetadata\": {\"orgId\": \"23aa2041-22e1-471f-9209-9b7396fa234f\", \"shortName\": \"XEN\", \"dateUpdated\": \"2026-01-28T15:33:44.782Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-23553\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-01-28T16:41:14.803Z\", \"dateReserved\": \"2026-01-14T13:07:36.961Z\", \"assignerOrgId\": \"23aa2041-22e1-471f-9209-9b7396fa234f\", \"datePublished\": \"2026-01-28T15:33:44.782Z\", \"assignerShortName\": \"XEN\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
SUSE-SU-2026:0304-1
Vulnerability from csaf_suse - Published: 2026-01-27 16:14 - Updated: 2026-01-27 16:14Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\n- CVE-2025-58150: Fixed buffer overrun with shadow paging and \n tracing (XSA-477) (bsc#1256745)\n- CVE-2026-23553: Fixed incomplete IBPB for vCPU isolation \n (XSA-479) (bsc#1256747)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-304,SUSE-SLE-Micro-5.5-2026-304",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0304-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0304-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260304-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0304-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023930.html"
},
{
"category": "self",
"summary": "SUSE Bug 1256745",
"url": "https://bugzilla.suse.com/1256745"
},
{
"category": "self",
"summary": "SUSE Bug 1256747",
"url": "https://bugzilla.suse.com/1256747"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58150 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23553 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23553/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2026-01-27T16:14:51Z",
"generator": {
"date": "2026-01-27T16:14:51Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0304-1",
"initial_release_date": "2026-01-27T16:14:51Z",
"revision_history": [
{
"date": "2026-01-27T16:14:51Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.17.6_04-150500.3.59.1.aarch64",
"product": {
"name": "xen-4.17.6_04-150500.3.59.1.aarch64",
"product_id": "xen-4.17.6_04-150500.3.59.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.17.6_04-150500.3.59.1.aarch64",
"product": {
"name": "xen-devel-4.17.6_04-150500.3.59.1.aarch64",
"product_id": "xen-devel-4.17.6_04-150500.3.59.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.17.6_04-150500.3.59.1.aarch64",
"product": {
"name": "xen-doc-html-4.17.6_04-150500.3.59.1.aarch64",
"product_id": "xen-doc-html-4.17.6_04-150500.3.59.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.17.6_04-150500.3.59.1.aarch64",
"product": {
"name": "xen-libs-4.17.6_04-150500.3.59.1.aarch64",
"product_id": "xen-libs-4.17.6_04-150500.3.59.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.17.6_04-150500.3.59.1.aarch64",
"product": {
"name": "xen-tools-4.17.6_04-150500.3.59.1.aarch64",
"product_id": "xen-tools-4.17.6_04-150500.3.59.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.17.6_04-150500.3.59.1.aarch64",
"product": {
"name": "xen-tools-domU-4.17.6_04-150500.3.59.1.aarch64",
"product_id": "xen-tools-domU-4.17.6_04-150500.3.59.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-libs-64bit-4.17.6_04-150500.3.59.1.aarch64_ilp32",
"product": {
"name": "xen-libs-64bit-4.17.6_04-150500.3.59.1.aarch64_ilp32",
"product_id": "xen-libs-64bit-4.17.6_04-150500.3.59.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.17.6_04-150500.3.59.1.i586",
"product": {
"name": "xen-devel-4.17.6_04-150500.3.59.1.i586",
"product_id": "xen-devel-4.17.6_04-150500.3.59.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.17.6_04-150500.3.59.1.i586",
"product": {
"name": "xen-libs-4.17.6_04-150500.3.59.1.i586",
"product_id": "xen-libs-4.17.6_04-150500.3.59.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.17.6_04-150500.3.59.1.i586",
"product": {
"name": "xen-tools-domU-4.17.6_04-150500.3.59.1.i586",
"product_id": "xen-tools-domU-4.17.6_04-150500.3.59.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.17.6_04-150500.3.59.1.noarch",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.17.6_04-150500.3.59.1.noarch",
"product_id": "xen-tools-xendomains-wait-disk-4.17.6_04-150500.3.59.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.17.6_04-150500.3.59.1.x86_64",
"product": {
"name": "xen-4.17.6_04-150500.3.59.1.x86_64",
"product_id": "xen-4.17.6_04-150500.3.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.17.6_04-150500.3.59.1.x86_64",
"product": {
"name": "xen-devel-4.17.6_04-150500.3.59.1.x86_64",
"product_id": "xen-devel-4.17.6_04-150500.3.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.17.6_04-150500.3.59.1.x86_64",
"product": {
"name": "xen-doc-html-4.17.6_04-150500.3.59.1.x86_64",
"product_id": "xen-doc-html-4.17.6_04-150500.3.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.17.6_04-150500.3.59.1.x86_64",
"product": {
"name": "xen-libs-4.17.6_04-150500.3.59.1.x86_64",
"product_id": "xen-libs-4.17.6_04-150500.3.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.17.6_04-150500.3.59.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.17.6_04-150500.3.59.1.x86_64",
"product_id": "xen-libs-32bit-4.17.6_04-150500.3.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.17.6_04-150500.3.59.1.x86_64",
"product": {
"name": "xen-tools-4.17.6_04-150500.3.59.1.x86_64",
"product_id": "xen-tools-4.17.6_04-150500.3.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.17.6_04-150500.3.59.1.x86_64",
"product": {
"name": "xen-tools-domU-4.17.6_04-150500.3.59.1.x86_64",
"product_id": "xen-tools-domU-4.17.6_04-150500.3.59.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.17.6_04-150500.3.59.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.6_04-150500.3.59.1.x86_64"
},
"product_reference": "xen-libs-4.17.6_04-150500.3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-58150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58150"
}
],
"notes": [
{
"category": "general",
"text": "Shadow mode tracing code uses a set of per-CPU variables to avoid\ncumbersome parameter passing. Some of these variables are written to\nwith guest controlled data, of guest controllable size. That size can\nbe larger than the variable, and bounding of the writes was missing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.6_04-150500.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58150",
"url": "https://www.suse.com/security/cve/CVE-2025-58150"
},
{
"category": "external",
"summary": "SUSE Bug 1256745 for CVE-2025-58150",
"url": "https://bugzilla.suse.com/1256745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.6_04-150500.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.6_04-150500.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-27T16:14:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-58150"
},
{
"cve": "CVE-2026-23553",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23553"
}
],
"notes": [
{
"category": "general",
"text": "In the context switch logic Xen attempts to skip an IBPB in the case of\na vCPU returning to a CPU on which it was the previous vCPU to run.\nWhile safe for Xen\u0027s isolation between vCPUs, this prevents the guest\nkernel correctly isolating between tasks. Consider:\n\n 1) vCPU runs on CPU A, running task 1.\n 2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB.\n 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB.\n 4) vCPU moves back to CPU A. Xen skips IBPB again.\n\nNow, task 2 is running on CPU A with task 1\u0027s training still in the BTB.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.6_04-150500.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23553",
"url": "https://www.suse.com/security/cve/CVE-2026-23553"
},
{
"category": "external",
"summary": "SUSE Bug 1256747 for CVE-2026-23553",
"url": "https://bugzilla.suse.com/1256747"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.6_04-150500.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.6_04-150500.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-27T16:14:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23553"
}
]
}
SUSE-SU-2026:0303-1
Vulnerability from csaf_suse - Published: 2026-01-27 16:14 - Updated: 2026-01-27 16:14Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\nSecurity fixes:\n \n- CVE-2025-58150: Fixed buffer overrun with shadow paging and \n tracing (XSA-477) (bsc#1256745)\n- CVE-2026-23553: Fixed incomplete IBPB for vCPU isolation \n (XSA-479) (bsc#1256747)\n- CVE-2025-58149: Fixed incorrect removal od permissions on PCI\n device unplug allow PV guests to access memory of devices no \n longer assigned to it (XSA-476) (bsc#1252692)\n- CVE-2025-27466, CVE-2025-58142, CVE-2025-58143: Fixed multiple\n vulnerabilities in the Viridian interface (XSA-472) (bsc#1248807)\n\nOther fixes:\n\n- Fixed virtxend service restart. Caused by a failure to start \n xenstored (bsc#1254180)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-303,SUSE-SUSE-MicroOS-5.2-2026-303",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0303-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0303-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260303-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0303-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023931.html"
},
{
"category": "self",
"summary": "SUSE Bug 1248807",
"url": "https://bugzilla.suse.com/1248807"
},
{
"category": "self",
"summary": "SUSE Bug 1252692",
"url": "https://bugzilla.suse.com/1252692"
},
{
"category": "self",
"summary": "SUSE Bug 1254180",
"url": "https://bugzilla.suse.com/1254180"
},
{
"category": "self",
"summary": "SUSE Bug 1256745",
"url": "https://bugzilla.suse.com/1256745"
},
{
"category": "self",
"summary": "SUSE Bug 1256747",
"url": "https://bugzilla.suse.com/1256747"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-27466 page",
"url": "https://www.suse.com/security/cve/CVE-2025-27466/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58142 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58143 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58143/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58150 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23553 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23553/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2026-01-27T16:14:45Z",
"generator": {
"date": "2026-01-27T16:14:45Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0303-1",
"initial_release_date": "2026-01-27T16:14:45Z",
"revision_history": [
{
"date": "2026-01-27T16:14:45Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.14.6_28-150300.3.94.1.aarch64",
"product": {
"name": "xen-4.14.6_28-150300.3.94.1.aarch64",
"product_id": "xen-4.14.6_28-150300.3.94.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.14.6_28-150300.3.94.1.aarch64",
"product": {
"name": "xen-devel-4.14.6_28-150300.3.94.1.aarch64",
"product_id": "xen-devel-4.14.6_28-150300.3.94.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.14.6_28-150300.3.94.1.aarch64",
"product": {
"name": "xen-doc-html-4.14.6_28-150300.3.94.1.aarch64",
"product_id": "xen-doc-html-4.14.6_28-150300.3.94.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.14.6_28-150300.3.94.1.aarch64",
"product": {
"name": "xen-libs-4.14.6_28-150300.3.94.1.aarch64",
"product_id": "xen-libs-4.14.6_28-150300.3.94.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.14.6_28-150300.3.94.1.aarch64",
"product": {
"name": "xen-tools-4.14.6_28-150300.3.94.1.aarch64",
"product_id": "xen-tools-4.14.6_28-150300.3.94.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.14.6_28-150300.3.94.1.aarch64",
"product": {
"name": "xen-tools-domU-4.14.6_28-150300.3.94.1.aarch64",
"product_id": "xen-tools-domU-4.14.6_28-150300.3.94.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-libs-64bit-4.14.6_28-150300.3.94.1.aarch64_ilp32",
"product": {
"name": "xen-libs-64bit-4.14.6_28-150300.3.94.1.aarch64_ilp32",
"product_id": "xen-libs-64bit-4.14.6_28-150300.3.94.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.14.6_28-150300.3.94.1.i586",
"product": {
"name": "xen-devel-4.14.6_28-150300.3.94.1.i586",
"product_id": "xen-devel-4.14.6_28-150300.3.94.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.14.6_28-150300.3.94.1.i586",
"product": {
"name": "xen-libs-4.14.6_28-150300.3.94.1.i586",
"product_id": "xen-libs-4.14.6_28-150300.3.94.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.14.6_28-150300.3.94.1.i586",
"product": {
"name": "xen-tools-domU-4.14.6_28-150300.3.94.1.i586",
"product_id": "xen-tools-domU-4.14.6_28-150300.3.94.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.14.6_28-150300.3.94.1.noarch",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.14.6_28-150300.3.94.1.noarch",
"product_id": "xen-tools-xendomains-wait-disk-4.14.6_28-150300.3.94.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.14.6_28-150300.3.94.1.x86_64",
"product": {
"name": "xen-4.14.6_28-150300.3.94.1.x86_64",
"product_id": "xen-4.14.6_28-150300.3.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.14.6_28-150300.3.94.1.x86_64",
"product": {
"name": "xen-devel-4.14.6_28-150300.3.94.1.x86_64",
"product_id": "xen-devel-4.14.6_28-150300.3.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.14.6_28-150300.3.94.1.x86_64",
"product": {
"name": "xen-doc-html-4.14.6_28-150300.3.94.1.x86_64",
"product_id": "xen-doc-html-4.14.6_28-150300.3.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.14.6_28-150300.3.94.1.x86_64",
"product": {
"name": "xen-libs-4.14.6_28-150300.3.94.1.x86_64",
"product_id": "xen-libs-4.14.6_28-150300.3.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.14.6_28-150300.3.94.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.14.6_28-150300.3.94.1.x86_64",
"product_id": "xen-libs-32bit-4.14.6_28-150300.3.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.14.6_28-150300.3.94.1.x86_64",
"product": {
"name": "xen-tools-4.14.6_28-150300.3.94.1.x86_64",
"product_id": "xen-tools-4.14.6_28-150300.3.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.14.6_28-150300.3.94.1.x86_64",
"product": {
"name": "xen-tools-domU-4.14.6_28-150300.3.94.1.x86_64",
"product_id": "xen-tools-domU-4.14.6_28-150300.3.94.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.14.6_28-150300.3.94.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
},
"product_reference": "xen-libs-4.14.6_28-150300.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-27466",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-27466"
}
],
"notes": [
{
"category": "general",
"text": "[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nThere are multiple issues related to the handling and accessing of guest\nmemory pages in the viridian code:\n\n 1. A NULL pointer dereference in the updating of the reference TSC area.\n This is CVE-2025-27466.\n\n 2. A NULL pointer dereference by assuming the SIM page is mapped when\n a synthetic timer message has to be delivered. This is\n CVE-2025-58142.\n\n 3. A race in the mapping of the reference TSC page, where a guest can\n get Xen to free a page while still present in the guest physical to\n machine (p2m) page tables. This is CVE-2025-58143.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-27466",
"url": "https://www.suse.com/security/cve/CVE-2025-27466"
},
{
"category": "external",
"summary": "SUSE Bug 1248807 for CVE-2025-27466",
"url": "https://bugzilla.suse.com/1248807"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-27T16:14:45Z",
"details": "important"
}
],
"title": "CVE-2025-27466"
},
{
"cve": "CVE-2025-58142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58142"
}
],
"notes": [
{
"category": "general",
"text": "[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nThere are multiple issues related to the handling and accessing of guest\nmemory pages in the viridian code:\n\n 1. A NULL pointer dereference in the updating of the reference TSC area.\n This is CVE-2025-27466.\n\n 2. A NULL pointer dereference by assuming the SIM page is mapped when\n a synthetic timer message has to be delivered. This is\n CVE-2025-58142.\n\n 3. A race in the mapping of the reference TSC page, where a guest can\n get Xen to free a page while still present in the guest physical to\n machine (p2m) page tables. This is CVE-2025-58143.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58142",
"url": "https://www.suse.com/security/cve/CVE-2025-58142"
},
{
"category": "external",
"summary": "SUSE Bug 1248807 for CVE-2025-58142",
"url": "https://bugzilla.suse.com/1248807"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-27T16:14:45Z",
"details": "important"
}
],
"title": "CVE-2025-58142"
},
{
"cve": "CVE-2025-58143",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58143"
}
],
"notes": [
{
"category": "general",
"text": "[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nThere are multiple issues related to the handling and accessing of guest\nmemory pages in the viridian code:\n\n 1. A NULL pointer dereference in the updating of the reference TSC area.\n This is CVE-2025-27466.\n\n 2. A NULL pointer dereference by assuming the SIM page is mapped when\n a synthetic timer message has to be delivered. This is\n CVE-2025-58142.\n\n 3. A race in the mapping of the reference TSC page, where a guest can\n get Xen to free a page while still present in the guest physical to\n machine (p2m) page tables. This is CVE-2025-58143.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58143",
"url": "https://www.suse.com/security/cve/CVE-2025-58143"
},
{
"category": "external",
"summary": "SUSE Bug 1248807 for CVE-2025-58143",
"url": "https://bugzilla.suse.com/1248807"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-27T16:14:45Z",
"details": "important"
}
],
"title": "CVE-2025-58143"
},
{
"cve": "CVE-2025-58149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58149"
}
],
"notes": [
{
"category": "general",
"text": "When passing through PCI devices, the detach logic in libxl won\u0027t remove\naccess permissions to any 64bit memory BARs the device might have. As a\nresult a domain can still have access any 64bit memory BAR when such\ndevice is no longer assigned to the domain.\n\nFor PV domains the permission leak allows the domain itself to map the memory\nin the page-tables. For HVM it would require a compromised device model or\nstubdomain to map the leaked memory into the HVM domain p2m.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58149",
"url": "https://www.suse.com/security/cve/CVE-2025-58149"
},
{
"category": "external",
"summary": "SUSE Bug 1252692 for CVE-2025-58149",
"url": "https://bugzilla.suse.com/1252692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-27T16:14:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-58149"
},
{
"cve": "CVE-2025-58150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58150"
}
],
"notes": [
{
"category": "general",
"text": "Shadow mode tracing code uses a set of per-CPU variables to avoid\ncumbersome parameter passing. Some of these variables are written to\nwith guest controlled data, of guest controllable size. That size can\nbe larger than the variable, and bounding of the writes was missing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58150",
"url": "https://www.suse.com/security/cve/CVE-2025-58150"
},
{
"category": "external",
"summary": "SUSE Bug 1256745 for CVE-2025-58150",
"url": "https://bugzilla.suse.com/1256745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-27T16:14:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-58150"
},
{
"cve": "CVE-2026-23553",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23553"
}
],
"notes": [
{
"category": "general",
"text": "In the context switch logic Xen attempts to skip an IBPB in the case of\na vCPU returning to a CPU on which it was the previous vCPU to run.\nWhile safe for Xen\u0027s isolation between vCPUs, this prevents the guest\nkernel correctly isolating between tasks. Consider:\n\n 1) vCPU runs on CPU A, running task 1.\n 2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB.\n 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB.\n 4) vCPU moves back to CPU A. Xen skips IBPB again.\n\nNow, task 2 is running on CPU A with task 1\u0027s training still in the BTB.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23553",
"url": "https://www.suse.com/security/cve/CVE-2026-23553"
},
{
"category": "external",
"summary": "SUSE Bug 1256747 for CVE-2026-23553",
"url": "https://bugzilla.suse.com/1256747"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-27T16:14:45Z",
"details": "moderate"
}
],
"title": "CVE-2026-23553"
}
]
}
SUSE-SU-2026:0306-1
Vulnerability from csaf_suse - Published: 2026-01-27 16:15 - Updated: 2026-01-27 16:15Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\n- CVE-2025-58150: Fixed buffer overrun with shadow paging and \n tracing (XSA-477) (bsc#1256745)\n- CVE-2026-23553: Fixed incomplete IBPB for vCPU isolation \n (XSA-479) (bsc#1256747)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-306,openSUSE-SLE-15.6-2026-306",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0306-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0306-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260306-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0306-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023928.html"
},
{
"category": "self",
"summary": "SUSE Bug 1256745",
"url": "https://bugzilla.suse.com/1256745"
},
{
"category": "self",
"summary": "SUSE Bug 1256747",
"url": "https://bugzilla.suse.com/1256747"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58150 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23553 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23553/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2026-01-27T16:15:19Z",
"generator": {
"date": "2026-01-27T16:15:19Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0306-1",
"initial_release_date": "2026-01-27T16:15:19Z",
"revision_history": [
{
"date": "2026-01-27T16:15:19Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.18.5_10-150600.3.37.1.aarch64",
"product": {
"name": "xen-4.18.5_10-150600.3.37.1.aarch64",
"product_id": "xen-4.18.5_10-150600.3.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.18.5_10-150600.3.37.1.aarch64",
"product": {
"name": "xen-devel-4.18.5_10-150600.3.37.1.aarch64",
"product_id": "xen-devel-4.18.5_10-150600.3.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.18.5_10-150600.3.37.1.aarch64",
"product": {
"name": "xen-doc-html-4.18.5_10-150600.3.37.1.aarch64",
"product_id": "xen-doc-html-4.18.5_10-150600.3.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.18.5_10-150600.3.37.1.aarch64",
"product": {
"name": "xen-libs-4.18.5_10-150600.3.37.1.aarch64",
"product_id": "xen-libs-4.18.5_10-150600.3.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.18.5_10-150600.3.37.1.aarch64",
"product": {
"name": "xen-tools-4.18.5_10-150600.3.37.1.aarch64",
"product_id": "xen-tools-4.18.5_10-150600.3.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.18.5_10-150600.3.37.1.aarch64",
"product": {
"name": "xen-tools-domU-4.18.5_10-150600.3.37.1.aarch64",
"product_id": "xen-tools-domU-4.18.5_10-150600.3.37.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-libs-64bit-4.18.5_10-150600.3.37.1.aarch64_ilp32",
"product": {
"name": "xen-libs-64bit-4.18.5_10-150600.3.37.1.aarch64_ilp32",
"product_id": "xen-libs-64bit-4.18.5_10-150600.3.37.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.18.5_10-150600.3.37.1.i586",
"product": {
"name": "xen-devel-4.18.5_10-150600.3.37.1.i586",
"product_id": "xen-devel-4.18.5_10-150600.3.37.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.18.5_10-150600.3.37.1.i586",
"product": {
"name": "xen-libs-4.18.5_10-150600.3.37.1.i586",
"product_id": "xen-libs-4.18.5_10-150600.3.37.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.18.5_10-150600.3.37.1.i586",
"product": {
"name": "xen-tools-domU-4.18.5_10-150600.3.37.1.i586",
"product_id": "xen-tools-domU-4.18.5_10-150600.3.37.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.18.5_10-150600.3.37.1.noarch",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.18.5_10-150600.3.37.1.noarch",
"product_id": "xen-tools-xendomains-wait-disk-4.18.5_10-150600.3.37.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.18.5_10-150600.3.37.1.x86_64",
"product": {
"name": "xen-4.18.5_10-150600.3.37.1.x86_64",
"product_id": "xen-4.18.5_10-150600.3.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.18.5_10-150600.3.37.1.x86_64",
"product": {
"name": "xen-devel-4.18.5_10-150600.3.37.1.x86_64",
"product_id": "xen-devel-4.18.5_10-150600.3.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.18.5_10-150600.3.37.1.x86_64",
"product": {
"name": "xen-doc-html-4.18.5_10-150600.3.37.1.x86_64",
"product_id": "xen-doc-html-4.18.5_10-150600.3.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.18.5_10-150600.3.37.1.x86_64",
"product": {
"name": "xen-libs-4.18.5_10-150600.3.37.1.x86_64",
"product_id": "xen-libs-4.18.5_10-150600.3.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.18.5_10-150600.3.37.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.18.5_10-150600.3.37.1.x86_64",
"product_id": "xen-libs-32bit-4.18.5_10-150600.3.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.18.5_10-150600.3.37.1.x86_64",
"product": {
"name": "xen-tools-4.18.5_10-150600.3.37.1.x86_64",
"product_id": "xen-tools-4.18.5_10-150600.3.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.18.5_10-150600.3.37.1.x86_64",
"product": {
"name": "xen-tools-domU-4.18.5_10-150600.3.37.1.x86_64",
"product_id": "xen-tools-domU-4.18.5_10-150600.3.37.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.18.5_10-150600.3.37.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-4.18.5_10-150600.3.37.1.aarch64"
},
"product_reference": "xen-4.18.5_10-150600.3.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.18.5_10-150600.3.37.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-4.18.5_10-150600.3.37.1.x86_64"
},
"product_reference": "xen-4.18.5_10-150600.3.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.18.5_10-150600.3.37.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-devel-4.18.5_10-150600.3.37.1.aarch64"
},
"product_reference": "xen-devel-4.18.5_10-150600.3.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.18.5_10-150600.3.37.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-devel-4.18.5_10-150600.3.37.1.x86_64"
},
"product_reference": "xen-devel-4.18.5_10-150600.3.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.18.5_10-150600.3.37.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-doc-html-4.18.5_10-150600.3.37.1.aarch64"
},
"product_reference": "xen-doc-html-4.18.5_10-150600.3.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.18.5_10-150600.3.37.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-doc-html-4.18.5_10-150600.3.37.1.x86_64"
},
"product_reference": "xen-doc-html-4.18.5_10-150600.3.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.18.5_10-150600.3.37.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-libs-4.18.5_10-150600.3.37.1.aarch64"
},
"product_reference": "xen-libs-4.18.5_10-150600.3.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.18.5_10-150600.3.37.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-libs-4.18.5_10-150600.3.37.1.x86_64"
},
"product_reference": "xen-libs-4.18.5_10-150600.3.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.18.5_10-150600.3.37.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-libs-32bit-4.18.5_10-150600.3.37.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.18.5_10-150600.3.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.18.5_10-150600.3.37.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-tools-4.18.5_10-150600.3.37.1.aarch64"
},
"product_reference": "xen-tools-4.18.5_10-150600.3.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.18.5_10-150600.3.37.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-tools-4.18.5_10-150600.3.37.1.x86_64"
},
"product_reference": "xen-tools-4.18.5_10-150600.3.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.18.5_10-150600.3.37.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-tools-domU-4.18.5_10-150600.3.37.1.aarch64"
},
"product_reference": "xen-tools-domU-4.18.5_10-150600.3.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.18.5_10-150600.3.37.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-tools-domU-4.18.5_10-150600.3.37.1.x86_64"
},
"product_reference": "xen-tools-domU-4.18.5_10-150600.3.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.18.5_10-150600.3.37.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_10-150600.3.37.1.noarch"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.18.5_10-150600.3.37.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-58150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58150"
}
],
"notes": [
{
"category": "general",
"text": "Shadow mode tracing code uses a set of per-CPU variables to avoid\ncumbersome parameter passing. Some of these variables are written to\nwith guest controlled data, of guest controllable size. That size can\nbe larger than the variable, and bounding of the writes was missing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.6:xen-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_10-150600.3.37.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58150",
"url": "https://www.suse.com/security/cve/CVE-2025-58150"
},
{
"category": "external",
"summary": "SUSE Bug 1256745 for CVE-2025-58150",
"url": "https://bugzilla.suse.com/1256745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.6:xen-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_10-150600.3.37.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.6:xen-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_10-150600.3.37.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-27T16:15:19Z",
"details": "moderate"
}
],
"title": "CVE-2025-58150"
},
{
"cve": "CVE-2026-23553",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23553"
}
],
"notes": [
{
"category": "general",
"text": "In the context switch logic Xen attempts to skip an IBPB in the case of\na vCPU returning to a CPU on which it was the previous vCPU to run.\nWhile safe for Xen\u0027s isolation between vCPUs, this prevents the guest\nkernel correctly isolating between tasks. Consider:\n\n 1) vCPU runs on CPU A, running task 1.\n 2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB.\n 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB.\n 4) vCPU moves back to CPU A. Xen skips IBPB again.\n\nNow, task 2 is running on CPU A with task 1\u0027s training still in the BTB.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.6:xen-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_10-150600.3.37.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23553",
"url": "https://www.suse.com/security/cve/CVE-2026-23553"
},
{
"category": "external",
"summary": "SUSE Bug 1256747 for CVE-2026-23553",
"url": "https://bugzilla.suse.com/1256747"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.6:xen-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_10-150600.3.37.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.6:xen-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_10-150600.3.37.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-27T16:15:19Z",
"details": "moderate"
}
],
"title": "CVE-2026-23553"
}
]
}
SUSE-SU-2026:0328-1
Vulnerability from csaf_suse - Published: 2026-01-28 15:39 - Updated: 2026-01-28 15:39Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\nSecurity fixes:\n \n- CVE-2025-58150: Fixed buffer overrun with shadow paging and \n tracing (XSA-477) (bsc#1256745)\n- CVE-2026-23553: Fixed incomplete IBPB for vCPU isolation \n (XSA-479) (bsc#1256747)\n- CVE-2025-58149: Fixed incorrect removal od permissions on PCI\n device unplug allow PV guests to access memory of devices no \n longer assigned to it (XSA-476) (bsc#1252692)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-328,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-328",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0328-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0328-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260328-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0328-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023973.html"
},
{
"category": "self",
"summary": "SUSE Bug 1252692",
"url": "https://bugzilla.suse.com/1252692"
},
{
"category": "self",
"summary": "SUSE Bug 1256745",
"url": "https://bugzilla.suse.com/1256745"
},
{
"category": "self",
"summary": "SUSE Bug 1256747",
"url": "https://bugzilla.suse.com/1256747"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58150 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23553 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23553/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2026-01-28T15:39:28Z",
"generator": {
"date": "2026-01-28T15:39:28Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0328-1",
"initial_release_date": "2026-01-28T15:39:28Z",
"revision_history": [
{
"date": "2026-01-28T15:39:28Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.12.4_64-3.137.1.aarch64",
"product": {
"name": "xen-4.12.4_64-3.137.1.aarch64",
"product_id": "xen-4.12.4_64-3.137.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.12.4_64-3.137.1.aarch64",
"product": {
"name": "xen-devel-4.12.4_64-3.137.1.aarch64",
"product_id": "xen-devel-4.12.4_64-3.137.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.12.4_64-3.137.1.aarch64",
"product": {
"name": "xen-doc-html-4.12.4_64-3.137.1.aarch64",
"product_id": "xen-doc-html-4.12.4_64-3.137.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.12.4_64-3.137.1.aarch64",
"product": {
"name": "xen-libs-4.12.4_64-3.137.1.aarch64",
"product_id": "xen-libs-4.12.4_64-3.137.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.12.4_64-3.137.1.aarch64",
"product": {
"name": "xen-tools-4.12.4_64-3.137.1.aarch64",
"product_id": "xen-tools-4.12.4_64-3.137.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.12.4_64-3.137.1.aarch64",
"product": {
"name": "xen-tools-domU-4.12.4_64-3.137.1.aarch64",
"product_id": "xen-tools-domU-4.12.4_64-3.137.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-libs-64bit-4.12.4_64-3.137.1.aarch64_ilp32",
"product": {
"name": "xen-libs-64bit-4.12.4_64-3.137.1.aarch64_ilp32",
"product_id": "xen-libs-64bit-4.12.4_64-3.137.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.12.4_64-3.137.1.i586",
"product": {
"name": "xen-devel-4.12.4_64-3.137.1.i586",
"product_id": "xen-devel-4.12.4_64-3.137.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.12.4_64-3.137.1.i586",
"product": {
"name": "xen-libs-4.12.4_64-3.137.1.i586",
"product_id": "xen-libs-4.12.4_64-3.137.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.12.4_64-3.137.1.i586",
"product": {
"name": "xen-tools-domU-4.12.4_64-3.137.1.i586",
"product_id": "xen-tools-domU-4.12.4_64-3.137.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.12.4_64-3.137.1.x86_64",
"product": {
"name": "xen-4.12.4_64-3.137.1.x86_64",
"product_id": "xen-4.12.4_64-3.137.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.12.4_64-3.137.1.x86_64",
"product": {
"name": "xen-devel-4.12.4_64-3.137.1.x86_64",
"product_id": "xen-devel-4.12.4_64-3.137.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.12.4_64-3.137.1.x86_64",
"product": {
"name": "xen-doc-html-4.12.4_64-3.137.1.x86_64",
"product_id": "xen-doc-html-4.12.4_64-3.137.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.12.4_64-3.137.1.x86_64",
"product": {
"name": "xen-libs-4.12.4_64-3.137.1.x86_64",
"product_id": "xen-libs-4.12.4_64-3.137.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.12.4_64-3.137.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.12.4_64-3.137.1.x86_64",
"product_id": "xen-libs-32bit-4.12.4_64-3.137.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.12.4_64-3.137.1.x86_64",
"product": {
"name": "xen-tools-4.12.4_64-3.137.1.x86_64",
"product_id": "xen-tools-4.12.4_64-3.137.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.12.4_64-3.137.1.x86_64",
"product": {
"name": "xen-tools-domU-4.12.4_64-3.137.1.x86_64",
"product_id": "xen-tools-domU-4.12.4_64-3.137.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.12.4_64-3.137.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-4.12.4_64-3.137.1.x86_64"
},
"product_reference": "xen-4.12.4_64-3.137.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.12.4_64-3.137.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-devel-4.12.4_64-3.137.1.x86_64"
},
"product_reference": "xen-devel-4.12.4_64-3.137.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.12.4_64-3.137.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-doc-html-4.12.4_64-3.137.1.x86_64"
},
"product_reference": "xen-doc-html-4.12.4_64-3.137.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.12.4_64-3.137.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-4.12.4_64-3.137.1.x86_64"
},
"product_reference": "xen-libs-4.12.4_64-3.137.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.12.4_64-3.137.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-32bit-4.12.4_64-3.137.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.12.4_64-3.137.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.12.4_64-3.137.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-4.12.4_64-3.137.1.x86_64"
},
"product_reference": "xen-tools-4.12.4_64-3.137.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.12.4_64-3.137.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-domU-4.12.4_64-3.137.1.x86_64"
},
"product_reference": "xen-tools-domU-4.12.4_64-3.137.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-58149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58149"
}
],
"notes": [
{
"category": "general",
"text": "When passing through PCI devices, the detach logic in libxl won\u0027t remove\naccess permissions to any 64bit memory BARs the device might have. As a\nresult a domain can still have access any 64bit memory BAR when such\ndevice is no longer assigned to the domain.\n\nFor PV domains the permission leak allows the domain itself to map the memory\nin the page-tables. For HVM it would require a compromised device model or\nstubdomain to map the leaked memory into the HVM domain p2m.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-devel-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-doc-html-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-32bit-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-domU-4.12.4_64-3.137.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58149",
"url": "https://www.suse.com/security/cve/CVE-2025-58149"
},
{
"category": "external",
"summary": "SUSE Bug 1252692 for CVE-2025-58149",
"url": "https://bugzilla.suse.com/1252692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-devel-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-doc-html-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-32bit-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-domU-4.12.4_64-3.137.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-devel-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-doc-html-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-32bit-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-domU-4.12.4_64-3.137.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T15:39:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-58149"
},
{
"cve": "CVE-2025-58150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58150"
}
],
"notes": [
{
"category": "general",
"text": "Shadow mode tracing code uses a set of per-CPU variables to avoid\ncumbersome parameter passing. Some of these variables are written to\nwith guest controlled data, of guest controllable size. That size can\nbe larger than the variable, and bounding of the writes was missing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-devel-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-doc-html-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-32bit-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-domU-4.12.4_64-3.137.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58150",
"url": "https://www.suse.com/security/cve/CVE-2025-58150"
},
{
"category": "external",
"summary": "SUSE Bug 1256745 for CVE-2025-58150",
"url": "https://bugzilla.suse.com/1256745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-devel-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-doc-html-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-32bit-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-domU-4.12.4_64-3.137.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-devel-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-doc-html-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-32bit-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-domU-4.12.4_64-3.137.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T15:39:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-58150"
},
{
"cve": "CVE-2026-23553",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23553"
}
],
"notes": [
{
"category": "general",
"text": "In the context switch logic Xen attempts to skip an IBPB in the case of\na vCPU returning to a CPU on which it was the previous vCPU to run.\nWhile safe for Xen\u0027s isolation between vCPUs, this prevents the guest\nkernel correctly isolating between tasks. Consider:\n\n 1) vCPU runs on CPU A, running task 1.\n 2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB.\n 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB.\n 4) vCPU moves back to CPU A. Xen skips IBPB again.\n\nNow, task 2 is running on CPU A with task 1\u0027s training still in the BTB.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-devel-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-doc-html-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-32bit-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-domU-4.12.4_64-3.137.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23553",
"url": "https://www.suse.com/security/cve/CVE-2026-23553"
},
{
"category": "external",
"summary": "SUSE Bug 1256747 for CVE-2026-23553",
"url": "https://bugzilla.suse.com/1256747"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-devel-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-doc-html-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-32bit-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-domU-4.12.4_64-3.137.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-devel-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-doc-html-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-32bit-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-domU-4.12.4_64-3.137.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T15:39:28Z",
"details": "moderate"
}
],
"title": "CVE-2026-23553"
}
]
}
SUSE-SU-2026:0394-1
Vulnerability from csaf_suse - Published: 2026-02-05 15:42 - Updated: 2026-02-05 15:42Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\nSecurity fixes:\n \n- CVE-2025-58150: Fixed buffer overrun with shadow paging and \n tracing (XSA-477) (bsc#1256745)\n- CVE-2026-23553: Fixed incomplete IBPB for vCPU isolation \n (XSA-479) (bsc#1256747)\n- CVE-2025-58149: Fixed incorrect removal od permissions on PCI\n device unplug allow PV guests to access memory of devices no \n longer assigned to it (XSA-476) (bsc#1252692)\n\nOther fixes:\n\n- Fixed virtxend service restart. Caused by a failure to start \n xenstored (bsc#1254180)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-394,SUSE-SLE-Micro-5.3-2026-394,SUSE-SLE-Micro-5.4-2026-394",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0394-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0394-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260394-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0394-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024075.html"
},
{
"category": "self",
"summary": "SUSE Bug 1252692",
"url": "https://bugzilla.suse.com/1252692"
},
{
"category": "self",
"summary": "SUSE Bug 1254180",
"url": "https://bugzilla.suse.com/1254180"
},
{
"category": "self",
"summary": "SUSE Bug 1256745",
"url": "https://bugzilla.suse.com/1256745"
},
{
"category": "self",
"summary": "SUSE Bug 1256747",
"url": "https://bugzilla.suse.com/1256747"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58150 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23553 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23553/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2026-02-05T15:42:11Z",
"generator": {
"date": "2026-02-05T15:42:11Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0394-1",
"initial_release_date": "2026-02-05T15:42:11Z",
"revision_history": [
{
"date": "2026-02-05T15:42:11Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.16.7_06-150400.4.78.1.aarch64",
"product": {
"name": "xen-4.16.7_06-150400.4.78.1.aarch64",
"product_id": "xen-4.16.7_06-150400.4.78.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.16.7_06-150400.4.78.1.aarch64",
"product": {
"name": "xen-devel-4.16.7_06-150400.4.78.1.aarch64",
"product_id": "xen-devel-4.16.7_06-150400.4.78.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.16.7_06-150400.4.78.1.aarch64",
"product": {
"name": "xen-doc-html-4.16.7_06-150400.4.78.1.aarch64",
"product_id": "xen-doc-html-4.16.7_06-150400.4.78.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.16.7_06-150400.4.78.1.aarch64",
"product": {
"name": "xen-libs-4.16.7_06-150400.4.78.1.aarch64",
"product_id": "xen-libs-4.16.7_06-150400.4.78.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.16.7_06-150400.4.78.1.aarch64",
"product": {
"name": "xen-tools-4.16.7_06-150400.4.78.1.aarch64",
"product_id": "xen-tools-4.16.7_06-150400.4.78.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.16.7_06-150400.4.78.1.aarch64",
"product": {
"name": "xen-tools-domU-4.16.7_06-150400.4.78.1.aarch64",
"product_id": "xen-tools-domU-4.16.7_06-150400.4.78.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-libs-64bit-4.16.7_06-150400.4.78.1.aarch64_ilp32",
"product": {
"name": "xen-libs-64bit-4.16.7_06-150400.4.78.1.aarch64_ilp32",
"product_id": "xen-libs-64bit-4.16.7_06-150400.4.78.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.16.7_06-150400.4.78.1.i586",
"product": {
"name": "xen-devel-4.16.7_06-150400.4.78.1.i586",
"product_id": "xen-devel-4.16.7_06-150400.4.78.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.16.7_06-150400.4.78.1.i586",
"product": {
"name": "xen-libs-4.16.7_06-150400.4.78.1.i586",
"product_id": "xen-libs-4.16.7_06-150400.4.78.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.16.7_06-150400.4.78.1.i586",
"product": {
"name": "xen-tools-domU-4.16.7_06-150400.4.78.1.i586",
"product_id": "xen-tools-domU-4.16.7_06-150400.4.78.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.16.7_06-150400.4.78.1.noarch",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.16.7_06-150400.4.78.1.noarch",
"product_id": "xen-tools-xendomains-wait-disk-4.16.7_06-150400.4.78.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.16.7_06-150400.4.78.1.x86_64",
"product": {
"name": "xen-4.16.7_06-150400.4.78.1.x86_64",
"product_id": "xen-4.16.7_06-150400.4.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.16.7_06-150400.4.78.1.x86_64",
"product": {
"name": "xen-devel-4.16.7_06-150400.4.78.1.x86_64",
"product_id": "xen-devel-4.16.7_06-150400.4.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.16.7_06-150400.4.78.1.x86_64",
"product": {
"name": "xen-doc-html-4.16.7_06-150400.4.78.1.x86_64",
"product_id": "xen-doc-html-4.16.7_06-150400.4.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.16.7_06-150400.4.78.1.x86_64",
"product": {
"name": "xen-libs-4.16.7_06-150400.4.78.1.x86_64",
"product_id": "xen-libs-4.16.7_06-150400.4.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.16.7_06-150400.4.78.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.16.7_06-150400.4.78.1.x86_64",
"product_id": "xen-libs-32bit-4.16.7_06-150400.4.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.16.7_06-150400.4.78.1.x86_64",
"product": {
"name": "xen-tools-4.16.7_06-150400.4.78.1.x86_64",
"product_id": "xen-tools-4.16.7_06-150400.4.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.16.7_06-150400.4.78.1.x86_64",
"product": {
"name": "xen-tools-domU-4.16.7_06-150400.4.78.1.x86_64",
"product_id": "xen-tools-domU-4.16.7_06-150400.4.78.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.16.7_06-150400.4.78.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.7_06-150400.4.78.1.x86_64"
},
"product_reference": "xen-libs-4.16.7_06-150400.4.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.16.7_06-150400.4.78.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.7_06-150400.4.78.1.x86_64"
},
"product_reference": "xen-libs-4.16.7_06-150400.4.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-58149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58149"
}
],
"notes": [
{
"category": "general",
"text": "When passing through PCI devices, the detach logic in libxl won\u0027t remove\naccess permissions to any 64bit memory BARs the device might have. As a\nresult a domain can still have access any 64bit memory BAR when such\ndevice is no longer assigned to the domain.\n\nFor PV domains the permission leak allows the domain itself to map the memory\nin the page-tables. For HVM it would require a compromised device model or\nstubdomain to map the leaked memory into the HVM domain p2m.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.7_06-150400.4.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.7_06-150400.4.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58149",
"url": "https://www.suse.com/security/cve/CVE-2025-58149"
},
{
"category": "external",
"summary": "SUSE Bug 1252692 for CVE-2025-58149",
"url": "https://bugzilla.suse.com/1252692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.7_06-150400.4.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.7_06-150400.4.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.7_06-150400.4.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.7_06-150400.4.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-05T15:42:11Z",
"details": "moderate"
}
],
"title": "CVE-2025-58149"
},
{
"cve": "CVE-2025-58150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58150"
}
],
"notes": [
{
"category": "general",
"text": "Shadow mode tracing code uses a set of per-CPU variables to avoid\ncumbersome parameter passing. Some of these variables are written to\nwith guest controlled data, of guest controllable size. That size can\nbe larger than the variable, and bounding of the writes was missing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.7_06-150400.4.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.7_06-150400.4.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58150",
"url": "https://www.suse.com/security/cve/CVE-2025-58150"
},
{
"category": "external",
"summary": "SUSE Bug 1256745 for CVE-2025-58150",
"url": "https://bugzilla.suse.com/1256745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.7_06-150400.4.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.7_06-150400.4.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.7_06-150400.4.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.7_06-150400.4.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-05T15:42:11Z",
"details": "moderate"
}
],
"title": "CVE-2025-58150"
},
{
"cve": "CVE-2026-23553",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23553"
}
],
"notes": [
{
"category": "general",
"text": "In the context switch logic Xen attempts to skip an IBPB in the case of\na vCPU returning to a CPU on which it was the previous vCPU to run.\nWhile safe for Xen\u0027s isolation between vCPUs, this prevents the guest\nkernel correctly isolating between tasks. Consider:\n\n 1) vCPU runs on CPU A, running task 1.\n 2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB.\n 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB.\n 4) vCPU moves back to CPU A. Xen skips IBPB again.\n\nNow, task 2 is running on CPU A with task 1\u0027s training still in the BTB.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.7_06-150400.4.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.7_06-150400.4.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23553",
"url": "https://www.suse.com/security/cve/CVE-2026-23553"
},
{
"category": "external",
"summary": "SUSE Bug 1256747 for CVE-2026-23553",
"url": "https://bugzilla.suse.com/1256747"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.7_06-150400.4.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.7_06-150400.4.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.7_06-150400.4.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.7_06-150400.4.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-05T15:42:11Z",
"details": "moderate"
}
],
"title": "CVE-2026-23553"
}
]
}
SUSE-SU-2026:0329-1
Vulnerability from csaf_suse - Published: 2026-01-28 15:39 - Updated: 2026-01-28 15:39Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\n- CVE-2025-58150: Fixed buffer overrun with shadow paging and \n tracing (XSA-477) (bsc#1256745)\n- CVE-2026-23553: Fixed incomplete IBPB for vCPU isolation \n (XSA-479) (bsc#1256747)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-329,SUSE-SLE-Module-Basesystem-15-SP7-2026-329,SUSE-SLE-Module-Server-Applications-15-SP7-2026-329",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0329-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0329-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260329-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0329-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-January/043757.html"
},
{
"category": "self",
"summary": "SUSE Bug 1256745",
"url": "https://bugzilla.suse.com/1256745"
},
{
"category": "self",
"summary": "SUSE Bug 1256747",
"url": "https://bugzilla.suse.com/1256747"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58150 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23553 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23553/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2026-01-28T15:39:40Z",
"generator": {
"date": "2026-01-28T15:39:40Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0329-1",
"initial_release_date": "2026-01-28T15:39:40Z",
"revision_history": [
{
"date": "2026-01-28T15:39:40Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.20.2_04-150700.3.22.1.aarch64",
"product": {
"name": "xen-4.20.2_04-150700.3.22.1.aarch64",
"product_id": "xen-4.20.2_04-150700.3.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.20.2_04-150700.3.22.1.aarch64",
"product": {
"name": "xen-devel-4.20.2_04-150700.3.22.1.aarch64",
"product_id": "xen-devel-4.20.2_04-150700.3.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.20.2_04-150700.3.22.1.aarch64",
"product": {
"name": "xen-doc-html-4.20.2_04-150700.3.22.1.aarch64",
"product_id": "xen-doc-html-4.20.2_04-150700.3.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.20.2_04-150700.3.22.1.aarch64",
"product": {
"name": "xen-libs-4.20.2_04-150700.3.22.1.aarch64",
"product_id": "xen-libs-4.20.2_04-150700.3.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.20.2_04-150700.3.22.1.aarch64",
"product": {
"name": "xen-tools-4.20.2_04-150700.3.22.1.aarch64",
"product_id": "xen-tools-4.20.2_04-150700.3.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.20.2_04-150700.3.22.1.aarch64",
"product": {
"name": "xen-tools-domU-4.20.2_04-150700.3.22.1.aarch64",
"product_id": "xen-tools-domU-4.20.2_04-150700.3.22.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-libs-64bit-4.20.2_04-150700.3.22.1.aarch64_ilp32",
"product": {
"name": "xen-libs-64bit-4.20.2_04-150700.3.22.1.aarch64_ilp32",
"product_id": "xen-libs-64bit-4.20.2_04-150700.3.22.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.20.2_04-150700.3.22.1.i586",
"product": {
"name": "xen-devel-4.20.2_04-150700.3.22.1.i586",
"product_id": "xen-devel-4.20.2_04-150700.3.22.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.20.2_04-150700.3.22.1.i586",
"product": {
"name": "xen-libs-4.20.2_04-150700.3.22.1.i586",
"product_id": "xen-libs-4.20.2_04-150700.3.22.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.20.2_04-150700.3.22.1.i586",
"product": {
"name": "xen-tools-domU-4.20.2_04-150700.3.22.1.i586",
"product_id": "xen-tools-domU-4.20.2_04-150700.3.22.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.20.2_04-150700.3.22.1.noarch",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.20.2_04-150700.3.22.1.noarch",
"product_id": "xen-tools-xendomains-wait-disk-4.20.2_04-150700.3.22.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.20.2_04-150700.3.22.1.x86_64",
"product": {
"name": "xen-4.20.2_04-150700.3.22.1.x86_64",
"product_id": "xen-4.20.2_04-150700.3.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.20.2_04-150700.3.22.1.x86_64",
"product": {
"name": "xen-devel-4.20.2_04-150700.3.22.1.x86_64",
"product_id": "xen-devel-4.20.2_04-150700.3.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.20.2_04-150700.3.22.1.x86_64",
"product": {
"name": "xen-doc-html-4.20.2_04-150700.3.22.1.x86_64",
"product_id": "xen-doc-html-4.20.2_04-150700.3.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.20.2_04-150700.3.22.1.x86_64",
"product": {
"name": "xen-libs-4.20.2_04-150700.3.22.1.x86_64",
"product_id": "xen-libs-4.20.2_04-150700.3.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.20.2_04-150700.3.22.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.20.2_04-150700.3.22.1.x86_64",
"product_id": "xen-libs-32bit-4.20.2_04-150700.3.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.20.2_04-150700.3.22.1.x86_64",
"product": {
"name": "xen-tools-4.20.2_04-150700.3.22.1.x86_64",
"product_id": "xen-tools-4.20.2_04-150700.3.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.20.2_04-150700.3.22.1.x86_64",
"product": {
"name": "xen-tools-domU-4.20.2_04-150700.3.22.1.x86_64",
"product_id": "xen-tools-domU-4.20.2_04-150700.3.22.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.20.2_04-150700.3.22.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-libs-4.20.2_04-150700.3.22.1.x86_64"
},
"product_reference": "xen-libs-4.20.2_04-150700.3.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.20.2_04-150700.3.22.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-tools-domU-4.20.2_04-150700.3.22.1.x86_64"
},
"product_reference": "xen-tools-domU-4.20.2_04-150700.3.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.20.2_04-150700.3.22.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-4.20.2_04-150700.3.22.1.x86_64"
},
"product_reference": "xen-4.20.2_04-150700.3.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.20.2_04-150700.3.22.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-devel-4.20.2_04-150700.3.22.1.x86_64"
},
"product_reference": "xen-devel-4.20.2_04-150700.3.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.20.2_04-150700.3.22.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-4.20.2_04-150700.3.22.1.x86_64"
},
"product_reference": "xen-tools-4.20.2_04-150700.3.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.20.2_04-150700.3.22.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-xendomains-wait-disk-4.20.2_04-150700.3.22.1.noarch"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.20.2_04-150700.3.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-58150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58150"
}
],
"notes": [
{
"category": "general",
"text": "Shadow mode tracing code uses a set of per-CPU variables to avoid\ncumbersome parameter passing. Some of these variables are written to\nwith guest controlled data, of guest controllable size. That size can\nbe larger than the variable, and bounding of the writes was missing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-libs-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-tools-domU-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-devel-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-xendomains-wait-disk-4.20.2_04-150700.3.22.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58150",
"url": "https://www.suse.com/security/cve/CVE-2025-58150"
},
{
"category": "external",
"summary": "SUSE Bug 1256745 for CVE-2025-58150",
"url": "https://bugzilla.suse.com/1256745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-libs-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-tools-domU-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-devel-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-xendomains-wait-disk-4.20.2_04-150700.3.22.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-libs-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-tools-domU-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-devel-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-xendomains-wait-disk-4.20.2_04-150700.3.22.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T15:39:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-58150"
},
{
"cve": "CVE-2026-23553",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23553"
}
],
"notes": [
{
"category": "general",
"text": "In the context switch logic Xen attempts to skip an IBPB in the case of\na vCPU returning to a CPU on which it was the previous vCPU to run.\nWhile safe for Xen\u0027s isolation between vCPUs, this prevents the guest\nkernel correctly isolating between tasks. Consider:\n\n 1) vCPU runs on CPU A, running task 1.\n 2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB.\n 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB.\n 4) vCPU moves back to CPU A. Xen skips IBPB again.\n\nNow, task 2 is running on CPU A with task 1\u0027s training still in the BTB.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-libs-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-tools-domU-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-devel-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-xendomains-wait-disk-4.20.2_04-150700.3.22.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23553",
"url": "https://www.suse.com/security/cve/CVE-2026-23553"
},
{
"category": "external",
"summary": "SUSE Bug 1256747 for CVE-2026-23553",
"url": "https://bugzilla.suse.com/1256747"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-libs-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-tools-domU-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-devel-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-xendomains-wait-disk-4.20.2_04-150700.3.22.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-libs-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-tools-domU-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-devel-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-xendomains-wait-disk-4.20.2_04-150700.3.22.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T15:39:40Z",
"details": "moderate"
}
],
"title": "CVE-2026-23553"
}
]
}
WID-SEC-W-2026-0229
Vulnerability from csaf_certbund - Published: 2026-01-27 23:00 - Updated: 2026-01-28 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "niedrig"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Citrix XenServer ist eine L\u00f6sung f\u00fcr das Management, die Konfiguration und den Betrieb virtueller Maschinen auf Servern.\r\nXen ist ein Virtueller-Maschinen-Monitor (VMM), der Hardware (x86, IA-64, PowerPC) f\u00fcr die darauf laufenden Systeme (Domains) paravirtualisiert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann eine Schwachstelle in Citrix Systems XenServer und Xen ausnutzen, um Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0229 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0229.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0229 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0229"
},
{
"category": "external",
"summary": "Xen Security Advisory 479 vom 2026-01-27",
"url": "https://xenbits.xen.org/xsa/advisory-479.html"
},
{
"category": "external",
"summary": "Citrix XenServer Security Update vom 2026-01-27",
"url": "https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX695997\u0026articleURL=XenServer_Security_Update_for_CVE_2025_58151_and_CVE_2026_23553"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0303-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023931.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0304-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023930.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0306-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023928.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0328-1 vom 2026-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023973.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0329-1 vom 2026-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023972.html"
}
],
"source_lang": "en-US",
"title": "Citrix Systems XenServer und Xen: Schwachstelle erm\u00f6glicht Offenlegung von Informationen",
"tracking": {
"current_release_date": "2026-01-28T23:00:00.000+00:00",
"generator": {
"date": "2026-01-29T07:51:14.964+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0229",
"initial_release_date": "2026-01-27T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-01-27T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE und European Union Vulnerability Database aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "8.4",
"product": {
"name": "Citrix Systems XenServer 8.4",
"product_id": "T050351",
"product_identification_helper": {
"cpe": "cpe:/a:citrix:xenserver:8.4"
}
}
}
],
"category": "product_name",
"name": "XenServer"
}
],
"category": "vendor",
"name": "Citrix Systems"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c4.18.x",
"product": {
"name": "Open Source Xen \u003c4.18.x",
"product_id": "T050352"
}
},
{
"category": "product_version",
"name": "4.18.x",
"product": {
"name": "Open Source Xen 4.18.x",
"product_id": "T050352-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:xen:xen:4.18.x"
}
}
}
],
"category": "product_name",
"name": "Xen"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-23553",
"product_status": {
"known_affected": [
"T002207",
"T050352",
"T050351"
]
},
"release_date": "2026-01-27T23:00:00.000+00:00",
"title": "CVE-2026-23553"
}
]
}
FKIE_CVE-2026-23553
Vulnerability from fkie_nvd - Published: 2026-01-28 16:16 - Updated: 2026-01-29 16:31| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the context switch logic Xen attempts to skip an IBPB in the case of\na vCPU returning to a CPU on which it was the previous vCPU to run.\nWhile safe for Xen\u0027s isolation between vCPUs, this prevents the guest\nkernel correctly isolating between tasks. Consider:\n\n 1) vCPU runs on CPU A, running task 1.\n 2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB.\n 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB.\n 4) vCPU moves back to CPU A. Xen skips IBPB again.\n\nNow, task 2 is running on CPU A with task 1\u0027s training still in the BTB."
}
],
"id": "CVE-2026-23553",
"lastModified": "2026-01-29T16:31:00.867",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 2.9,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.4,
"impactScore": 1.4,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2026-01-28T16:16:16.853",
"references": [
{
"source": "security@xen.org",
"url": "https://xenbits.xenproject.org/xsa/advisory-479.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2026/01/27/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://xenbits.xen.org/xsa/advisory-479.html"
}
],
"sourceIdentifier": "security@xen.org",
"vulnStatus": "Undergoing Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-665"
},
{
"lang": "en",
"value": "CWE-693"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
CERTFR-2026-AVI-0090
Vulnerability from certfr_avis - Published: 2026-01-27 - Updated: 2026-01-27
De multiples vulnérabilités ont été découvertes dans Citrix XenServer. Elles permettent à un attaquant de provoquer un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "XenServer version 8.4 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-23553",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23553"
},
{
"name": "CVE-2025-58151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58151"
}
],
"initial_release_date": "2026-01-27T00:00:00",
"last_revision_date": "2026-01-27T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0090",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-01-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Citrix XenServer. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Citrix XenServer",
"vendor_advisories": [
{
"published_at": "2026-01-27",
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX695997",
"url": "https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX695997\u0026articleURL=XenServer_Security_Update_for_CVE_2025_58151_and_CVE_2026_23553"
}
]
}
CERTFR-2026-AVI-0091
Vulnerability from certfr_avis - Published: 2026-01-27 - Updated: 2026-01-27
De multiples vulnérabilités ont été découvertes dans Xen. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| XEN | Xen | Xen versions xen-unstable sans les correctifs de sécurité xsa477.patch et xsa479.patch | ||
| XEN | Xen | Xen versions 4.18.x sans les correctifs de sécurité xsa477-4.18.patch et xsa479.patch | ||
| XEN | Xen | Xen versions 4.19.x sans le correctif de securité xsa477.patch | ||
| XEN | Xen | Xen version varstored master sans le correctif de sécurité xsa478.patch |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Xen versions xen-unstable sans les correctifs de s\u00e9curit\u00e9 xsa477.patch et xsa479.patch",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
},
{
"description": "Xen versions 4.18.x sans les correctifs de s\u00e9curit\u00e9 xsa477-4.18.patch et xsa479.patch",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
},
{
"description": "Xen versions 4.19.x sans le correctif de securit\u00e9 xsa477.patch",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
},
{
"description": "Xen version varstored master sans le correctif de s\u00e9curit\u00e9 xsa478.patch",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-23553",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23553"
},
{
"name": "CVE-2025-58151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58151"
},
{
"name": "CVE-2025-58150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58150"
}
],
"initial_release_date": "2026-01-27T00:00:00",
"last_revision_date": "2026-01-27T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0091",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-01-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Xen. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Xen",
"vendor_advisories": [
{
"published_at": "2026-01-27",
"title": "Bulletin de s\u00e9curit\u00e9 Xen xsa/advisory-477",
"url": "https://xenbits.xen.org/xsa/advisory-477.html"
},
{
"published_at": "2026-01-27",
"title": "Bulletin de s\u00e9curit\u00e9 Xen xsa/advisory-478",
"url": "https://xenbits.xen.org/xsa/advisory-478.html"
},
{
"published_at": "2026-01-27",
"title": "Bulletin de s\u00e9curit\u00e9 Xen xsa/advisory-479",
"url": "https://xenbits.xen.org/xsa/advisory-479.html"
}
]
}
GHSA-PXQC-5JG3-XFQM
Vulnerability from github – Published: 2026-01-28 18:30 – Updated: 2026-01-28 18:30In the context switch logic Xen attempts to skip an IBPB in the case of a vCPU returning to a CPU on which it was the previous vCPU to run. While safe for Xen's isolation between vCPUs, this prevents the guest kernel correctly isolating between tasks. Consider:
1) vCPU runs on CPU A, running task 1. 2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB. 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB. 4) vCPU moves back to CPU A. Xen skips IBPB again.
Now, task 2 is running on CPU A with task 1's training still in the BTB.
{
"affected": [],
"aliases": [
"CVE-2026-23553"
],
"database_specific": {
"cwe_ids": [
"CWE-665"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-01-28T16:16:16Z",
"severity": "LOW"
},
"details": "In the context switch logic Xen attempts to skip an IBPB in the case of\na vCPU returning to a CPU on which it was the previous vCPU to run.\nWhile safe for Xen\u0027s isolation between vCPUs, this prevents the guest\nkernel correctly isolating between tasks. Consider:\n\n 1) vCPU runs on CPU A, running task 1.\n 2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB.\n 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB.\n 4) vCPU moves back to CPU A. Xen skips IBPB again.\n\nNow, task 2 is running on CPU A with task 1\u0027s training still in the BTB.",
"id": "GHSA-pxqc-5jg3-xfqm",
"modified": "2026-01-28T18:30:47Z",
"published": "2026-01-28T18:30:47Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23553"
},
{
"type": "WEB",
"url": "https://xenbits.xenproject.org/xsa/advisory-479.html"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2026/01/27/3"
},
{
"type": "WEB",
"url": "http://xenbits.xen.org/xsa/advisory-479.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
}
]
}
OPENSUSE-SU-2026:10118-1
Vulnerability from csaf_opensuse - Published: 2026-01-29 00:00 - Updated: 2026-01-29 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "xen-4.21.0_04-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the xen-4.21.0_04-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10118",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10118-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58150 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23553 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23553/"
}
],
"title": "xen-4.21.0_04-1.1 on GA media",
"tracking": {
"current_release_date": "2026-01-29T00:00:00Z",
"generator": {
"date": "2026-01-29T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10118-1",
"initial_release_date": "2026-01-29T00:00:00Z",
"revision_history": [
{
"date": "2026-01-29T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.21.0_04-1.1.aarch64",
"product": {
"name": "xen-4.21.0_04-1.1.aarch64",
"product_id": "xen-4.21.0_04-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.21.0_04-1.1.aarch64",
"product": {
"name": "xen-devel-4.21.0_04-1.1.aarch64",
"product_id": "xen-devel-4.21.0_04-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.21.0_04-1.1.aarch64",
"product": {
"name": "xen-doc-html-4.21.0_04-1.1.aarch64",
"product_id": "xen-doc-html-4.21.0_04-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.21.0_04-1.1.aarch64",
"product": {
"name": "xen-libs-4.21.0_04-1.1.aarch64",
"product_id": "xen-libs-4.21.0_04-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.21.0_04-1.1.aarch64",
"product": {
"name": "xen-tools-4.21.0_04-1.1.aarch64",
"product_id": "xen-tools-4.21.0_04-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.21.0_04-1.1.aarch64",
"product": {
"name": "xen-tools-domU-4.21.0_04-1.1.aarch64",
"product_id": "xen-tools-domU-4.21.0_04-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.aarch64",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.aarch64",
"product_id": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.21.0_04-1.1.ppc64le",
"product": {
"name": "xen-4.21.0_04-1.1.ppc64le",
"product_id": "xen-4.21.0_04-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-devel-4.21.0_04-1.1.ppc64le",
"product": {
"name": "xen-devel-4.21.0_04-1.1.ppc64le",
"product_id": "xen-devel-4.21.0_04-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.21.0_04-1.1.ppc64le",
"product": {
"name": "xen-doc-html-4.21.0_04-1.1.ppc64le",
"product_id": "xen-doc-html-4.21.0_04-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-libs-4.21.0_04-1.1.ppc64le",
"product": {
"name": "xen-libs-4.21.0_04-1.1.ppc64le",
"product_id": "xen-libs-4.21.0_04-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-tools-4.21.0_04-1.1.ppc64le",
"product": {
"name": "xen-tools-4.21.0_04-1.1.ppc64le",
"product_id": "xen-tools-4.21.0_04-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.21.0_04-1.1.ppc64le",
"product": {
"name": "xen-tools-domU-4.21.0_04-1.1.ppc64le",
"product_id": "xen-tools-domU-4.21.0_04-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.ppc64le",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.ppc64le",
"product_id": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.21.0_04-1.1.s390x",
"product": {
"name": "xen-4.21.0_04-1.1.s390x",
"product_id": "xen-4.21.0_04-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xen-devel-4.21.0_04-1.1.s390x",
"product": {
"name": "xen-devel-4.21.0_04-1.1.s390x",
"product_id": "xen-devel-4.21.0_04-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.21.0_04-1.1.s390x",
"product": {
"name": "xen-doc-html-4.21.0_04-1.1.s390x",
"product_id": "xen-doc-html-4.21.0_04-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xen-libs-4.21.0_04-1.1.s390x",
"product": {
"name": "xen-libs-4.21.0_04-1.1.s390x",
"product_id": "xen-libs-4.21.0_04-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xen-tools-4.21.0_04-1.1.s390x",
"product": {
"name": "xen-tools-4.21.0_04-1.1.s390x",
"product_id": "xen-tools-4.21.0_04-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.21.0_04-1.1.s390x",
"product": {
"name": "xen-tools-domU-4.21.0_04-1.1.s390x",
"product_id": "xen-tools-domU-4.21.0_04-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.s390x",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.s390x",
"product_id": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.21.0_04-1.1.x86_64",
"product": {
"name": "xen-4.21.0_04-1.1.x86_64",
"product_id": "xen-4.21.0_04-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.21.0_04-1.1.x86_64",
"product": {
"name": "xen-devel-4.21.0_04-1.1.x86_64",
"product_id": "xen-devel-4.21.0_04-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.21.0_04-1.1.x86_64",
"product": {
"name": "xen-doc-html-4.21.0_04-1.1.x86_64",
"product_id": "xen-doc-html-4.21.0_04-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.21.0_04-1.1.x86_64",
"product": {
"name": "xen-libs-4.21.0_04-1.1.x86_64",
"product_id": "xen-libs-4.21.0_04-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.21.0_04-1.1.x86_64",
"product": {
"name": "xen-tools-4.21.0_04-1.1.x86_64",
"product_id": "xen-tools-4.21.0_04-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.21.0_04-1.1.x86_64",
"product": {
"name": "xen-tools-domU-4.21.0_04-1.1.x86_64",
"product_id": "xen-tools-domU-4.21.0_04-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.x86_64",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.x86_64",
"product_id": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.21.0_04-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-4.21.0_04-1.1.aarch64"
},
"product_reference": "xen-4.21.0_04-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.21.0_04-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-4.21.0_04-1.1.ppc64le"
},
"product_reference": "xen-4.21.0_04-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.21.0_04-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-4.21.0_04-1.1.s390x"
},
"product_reference": "xen-4.21.0_04-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.21.0_04-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-4.21.0_04-1.1.x86_64"
},
"product_reference": "xen-4.21.0_04-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.21.0_04-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.aarch64"
},
"product_reference": "xen-devel-4.21.0_04-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.21.0_04-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.ppc64le"
},
"product_reference": "xen-devel-4.21.0_04-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.21.0_04-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.s390x"
},
"product_reference": "xen-devel-4.21.0_04-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.21.0_04-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.x86_64"
},
"product_reference": "xen-devel-4.21.0_04-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.21.0_04-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.aarch64"
},
"product_reference": "xen-doc-html-4.21.0_04-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.21.0_04-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.ppc64le"
},
"product_reference": "xen-doc-html-4.21.0_04-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.21.0_04-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.s390x"
},
"product_reference": "xen-doc-html-4.21.0_04-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.21.0_04-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.x86_64"
},
"product_reference": "xen-doc-html-4.21.0_04-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.21.0_04-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.aarch64"
},
"product_reference": "xen-libs-4.21.0_04-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.21.0_04-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.ppc64le"
},
"product_reference": "xen-libs-4.21.0_04-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.21.0_04-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.s390x"
},
"product_reference": "xen-libs-4.21.0_04-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.21.0_04-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.x86_64"
},
"product_reference": "xen-libs-4.21.0_04-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.21.0_04-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.aarch64"
},
"product_reference": "xen-tools-4.21.0_04-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.21.0_04-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.ppc64le"
},
"product_reference": "xen-tools-4.21.0_04-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.21.0_04-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.s390x"
},
"product_reference": "xen-tools-4.21.0_04-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.21.0_04-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.x86_64"
},
"product_reference": "xen-tools-4.21.0_04-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.21.0_04-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.aarch64"
},
"product_reference": "xen-tools-domU-4.21.0_04-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.21.0_04-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.ppc64le"
},
"product_reference": "xen-tools-domU-4.21.0_04-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.21.0_04-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.s390x"
},
"product_reference": "xen-tools-domU-4.21.0_04-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.21.0_04-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.x86_64"
},
"product_reference": "xen-tools-domU-4.21.0_04-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.aarch64"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.ppc64le"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.s390x"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.x86_64"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-58150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58150"
}
],
"notes": [
{
"category": "general",
"text": "Shadow mode tracing code uses a set of per-CPU variables to avoid\ncumbersome parameter passing. Some of these variables are written to\nwith guest controlled data, of guest controllable size. That size can\nbe larger than the variable, and bounding of the writes was missing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58150",
"url": "https://www.suse.com/security/cve/CVE-2025-58150"
},
{
"category": "external",
"summary": "SUSE Bug 1256745 for CVE-2025-58150",
"url": "https://bugzilla.suse.com/1256745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-29T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-58150"
},
{
"cve": "CVE-2026-23553",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23553"
}
],
"notes": [
{
"category": "general",
"text": "In the context switch logic Xen attempts to skip an IBPB in the case of\na vCPU returning to a CPU on which it was the previous vCPU to run.\nWhile safe for Xen\u0027s isolation between vCPUs, this prevents the guest\nkernel correctly isolating between tasks. Consider:\n\n 1) vCPU runs on CPU A, running task 1.\n 2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB.\n 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB.\n 4) vCPU moves back to CPU A. Xen skips IBPB again.\n\nNow, task 2 is running on CPU A with task 1\u0027s training still in the BTB.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23553",
"url": "https://www.suse.com/security/cve/CVE-2026-23553"
},
{
"category": "external",
"summary": "SUSE Bug 1256747 for CVE-2026-23553",
"url": "https://bugzilla.suse.com/1256747"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-29T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-23553"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.