Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-58150 (GCVE-0-2025-58150)
Vulnerability from cvelistv5 – Published: 2026-01-28 15:33 – Updated: 2026-01-28 16:46
VLAI?
EPSS
Title
x86: buffer overrun with shadow paging + tracing
Summary
Shadow mode tracing code uses a set of per-CPU variables to avoid
cumbersome parameter passing. Some of these variables are written to
with guest controlled data, of guest controllable size. That size can
be larger than the variable, and bounding of the writes was missing.
Severity ?
8.8 (High)
CWE
- CWE-787 - Out-of-bounds Write
Assigner
References
Credits
This issue was discovered by Jan Beulich of SUSE.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2026-01-28T16:11:53.448Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2026/01/27/1"
},
{
"url": "http://xenbits.xen.org/xsa/advisory-477.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-58150",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-28T16:44:38.812623Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-28T16:46:04.355Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Xen",
"vendor": "Xen",
"versions": [
{
"status": "unknown",
"version": "consult Xen advisory XSA-477"
}
]
}
],
"configurations": [
{
"lang": "en",
"value": "Only x86 systems are vulnerable. Arm systems are not vulnerable.\n\nOnly HVM guests running in shadow paging mode and with tracing enabled\ncan leverage the vulnerability."
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "This issue was discovered by Jan Beulich of SUSE."
}
],
"datePublic": "2026-01-27T12:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Shadow mode tracing code uses a set of per-CPU variables to avoid\ncumbersome parameter passing. Some of these variables are written to\nwith guest controlled data, of guest controllable size. That size can\nbe larger than the variable, and bounding of the writes was missing."
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "The exact effects depend on what\u0027s adjacent to the variables in\nquestion. The most likely effects are bogus trace data, but none of\nprivilege escalation, information leaks, or Denial of Service (DoS) can\nbe excluded without detailed analysis of the particular build of Xen."
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-28T15:33:17.316Z",
"orgId": "23aa2041-22e1-471f-9209-9b7396fa234f",
"shortName": "XEN"
},
"references": [
{
"url": "https://xenbits.xenproject.org/xsa/advisory-477.html"
}
],
"title": "x86: buffer overrun with shadow paging + tracing",
"workarounds": [
{
"lang": "en",
"value": "Running HVM guests in HAP mode only will avoid the vulnerability.\n\nNot enabling tracing will also avoid the vulnerability. Tracing is\nenabled by the \"tbuf_size=\" command line option, or by running tools\nlike xentrace or xenbaked in Dom0. Note that on a running system\nstopping xentrace / xenbaked would disable tracing. For xentrace,\nhowever, this additionally requires that it wasn\u0027t started with the -x\noption. Stopping previously enabled tracing can of course only prevent\nfuture damage; prior damage may have occurred and may manifest only\nlater."
}
]
}
},
"cveMetadata": {
"assignerOrgId": "23aa2041-22e1-471f-9209-9b7396fa234f",
"assignerShortName": "XEN",
"cveId": "CVE-2025-58150",
"datePublished": "2026-01-28T15:33:17.316Z",
"dateReserved": "2025-08-26T06:48:41.444Z",
"dateUpdated": "2026-01-28T16:46:04.355Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-58150\",\"sourceIdentifier\":\"security@xen.org\",\"published\":\"2026-01-28T16:16:12.880\",\"lastModified\":\"2026-01-29T16:31:00.867\",\"vulnStatus\":\"Undergoing Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Shadow mode tracing code uses a set of per-CPU variables to avoid\\ncumbersome parameter passing. Some of these variables are written to\\nwith guest controlled data, of guest controllable size. That size can\\nbe larger than the variable, and bounding of the writes was missing.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.0,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"references\":[{\"url\":\"https://xenbits.xenproject.org/xsa/advisory-477.html\",\"source\":\"security@xen.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2026/01/27/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://xenbits.xen.org/xsa/advisory-477.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2026/01/27/1\"}, {\"url\": \"http://xenbits.xen.org/xsa/advisory-477.html\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2026-01-28T16:11:53.448Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 8.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-58150\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-01-28T16:44:38.812623Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-787\", \"description\": \"CWE-787 Out-of-bounds Write\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-01-28T16:45:27.977Z\"}}], \"cna\": {\"title\": \"x86: buffer overrun with shadow paging + tracing\", \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"This issue was discovered by Jan Beulich of SUSE.\"}], \"impacts\": [{\"descriptions\": [{\"lang\": \"en\", \"value\": \"The exact effects depend on what\u0027s adjacent to the variables in\\nquestion. The most likely effects are bogus trace data, but none of\\nprivilege escalation, information leaks, or Denial of Service (DoS) can\\nbe excluded without detailed analysis of the particular build of Xen.\"}]}], \"affected\": [{\"vendor\": \"Xen\", \"product\": \"Xen\", \"versions\": [{\"status\": \"unknown\", \"version\": \"consult Xen advisory XSA-477\"}], \"defaultStatus\": \"unknown\"}], \"datePublic\": \"2026-01-27T12:00:00.000Z\", \"references\": [{\"url\": \"https://xenbits.xenproject.org/xsa/advisory-477.html\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Running HVM guests in HAP mode only will avoid the vulnerability.\\n\\nNot enabling tracing will also avoid the vulnerability. Tracing is\\nenabled by the \\\"tbuf_size=\\\" command line option, or by running tools\\nlike xentrace or xenbaked in Dom0. Note that on a running system\\nstopping xentrace / xenbaked would disable tracing. For xentrace,\\nhowever, this additionally requires that it wasn\u0027t started with the -x\\noption. Stopping previously enabled tracing can of course only prevent\\nfuture damage; prior damage may have occurred and may manifest only\\nlater.\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Shadow mode tracing code uses a set of per-CPU variables to avoid\\ncumbersome parameter passing. Some of these variables are written to\\nwith guest controlled data, of guest controllable size. That size can\\nbe larger than the variable, and bounding of the writes was missing.\"}], \"configurations\": [{\"lang\": \"en\", \"value\": \"Only x86 systems are vulnerable. Arm systems are not vulnerable.\\n\\nOnly HVM guests running in shadow paging mode and with tracing enabled\\ncan leverage the vulnerability.\"}], \"providerMetadata\": {\"orgId\": \"23aa2041-22e1-471f-9209-9b7396fa234f\", \"shortName\": \"XEN\", \"dateUpdated\": \"2026-01-28T15:33:17.316Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-58150\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-01-28T16:46:04.355Z\", \"dateReserved\": \"2025-08-26T06:48:41.444Z\", \"assignerOrgId\": \"23aa2041-22e1-471f-9209-9b7396fa234f\", \"datePublished\": \"2026-01-28T15:33:17.316Z\", \"assignerShortName\": \"XEN\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
GHSA-VQ9R-CP35-P48Q
Vulnerability from github – Published: 2026-01-28 18:30 – Updated: 2026-01-28 18:30
VLAI?
Details
Shadow mode tracing code uses a set of per-CPU variables to avoid cumbersome parameter passing. Some of these variables are written to with guest controlled data, of guest controllable size. That size can be larger than the variable, and bounding of the writes was missing.
Severity ?
8.8 (High)
{
"affected": [],
"aliases": [
"CVE-2025-58150"
],
"database_specific": {
"cwe_ids": [
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-01-28T16:16:12Z",
"severity": "HIGH"
},
"details": "Shadow mode tracing code uses a set of per-CPU variables to avoid\ncumbersome parameter passing. Some of these variables are written to\nwith guest controlled data, of guest controllable size. That size can\nbe larger than the variable, and bounding of the writes was missing.",
"id": "GHSA-vq9r-cp35-p48q",
"modified": "2026-01-28T18:30:47Z",
"published": "2026-01-28T18:30:47Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58150"
},
{
"type": "WEB",
"url": "https://xenbits.xenproject.org/xsa/advisory-477.html"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2026/01/27/1"
},
{
"type": "WEB",
"url": "http://xenbits.xen.org/xsa/advisory-477.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
SUSE-SU-2026:0304-1
Vulnerability from csaf_suse - Published: 2026-01-27 16:14 - Updated: 2026-01-27 16:14Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2025-58150: Fixed buffer overrun with shadow paging and
tracing (XSA-477) (bsc#1256745)
- CVE-2026-23553: Fixed incomplete IBPB for vCPU isolation
(XSA-479) (bsc#1256747)
Patchnames
SUSE-2026-304,SUSE-SLE-Micro-5.5-2026-304
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\n- CVE-2025-58150: Fixed buffer overrun with shadow paging and \n tracing (XSA-477) (bsc#1256745)\n- CVE-2026-23553: Fixed incomplete IBPB for vCPU isolation \n (XSA-479) (bsc#1256747)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-304,SUSE-SLE-Micro-5.5-2026-304",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0304-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0304-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260304-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0304-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023930.html"
},
{
"category": "self",
"summary": "SUSE Bug 1256745",
"url": "https://bugzilla.suse.com/1256745"
},
{
"category": "self",
"summary": "SUSE Bug 1256747",
"url": "https://bugzilla.suse.com/1256747"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58150 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23553 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23553/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2026-01-27T16:14:51Z",
"generator": {
"date": "2026-01-27T16:14:51Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0304-1",
"initial_release_date": "2026-01-27T16:14:51Z",
"revision_history": [
{
"date": "2026-01-27T16:14:51Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.17.6_04-150500.3.59.1.aarch64",
"product": {
"name": "xen-4.17.6_04-150500.3.59.1.aarch64",
"product_id": "xen-4.17.6_04-150500.3.59.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.17.6_04-150500.3.59.1.aarch64",
"product": {
"name": "xen-devel-4.17.6_04-150500.3.59.1.aarch64",
"product_id": "xen-devel-4.17.6_04-150500.3.59.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.17.6_04-150500.3.59.1.aarch64",
"product": {
"name": "xen-doc-html-4.17.6_04-150500.3.59.1.aarch64",
"product_id": "xen-doc-html-4.17.6_04-150500.3.59.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.17.6_04-150500.3.59.1.aarch64",
"product": {
"name": "xen-libs-4.17.6_04-150500.3.59.1.aarch64",
"product_id": "xen-libs-4.17.6_04-150500.3.59.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.17.6_04-150500.3.59.1.aarch64",
"product": {
"name": "xen-tools-4.17.6_04-150500.3.59.1.aarch64",
"product_id": "xen-tools-4.17.6_04-150500.3.59.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.17.6_04-150500.3.59.1.aarch64",
"product": {
"name": "xen-tools-domU-4.17.6_04-150500.3.59.1.aarch64",
"product_id": "xen-tools-domU-4.17.6_04-150500.3.59.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-libs-64bit-4.17.6_04-150500.3.59.1.aarch64_ilp32",
"product": {
"name": "xen-libs-64bit-4.17.6_04-150500.3.59.1.aarch64_ilp32",
"product_id": "xen-libs-64bit-4.17.6_04-150500.3.59.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.17.6_04-150500.3.59.1.i586",
"product": {
"name": "xen-devel-4.17.6_04-150500.3.59.1.i586",
"product_id": "xen-devel-4.17.6_04-150500.3.59.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.17.6_04-150500.3.59.1.i586",
"product": {
"name": "xen-libs-4.17.6_04-150500.3.59.1.i586",
"product_id": "xen-libs-4.17.6_04-150500.3.59.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.17.6_04-150500.3.59.1.i586",
"product": {
"name": "xen-tools-domU-4.17.6_04-150500.3.59.1.i586",
"product_id": "xen-tools-domU-4.17.6_04-150500.3.59.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.17.6_04-150500.3.59.1.noarch",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.17.6_04-150500.3.59.1.noarch",
"product_id": "xen-tools-xendomains-wait-disk-4.17.6_04-150500.3.59.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.17.6_04-150500.3.59.1.x86_64",
"product": {
"name": "xen-4.17.6_04-150500.3.59.1.x86_64",
"product_id": "xen-4.17.6_04-150500.3.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.17.6_04-150500.3.59.1.x86_64",
"product": {
"name": "xen-devel-4.17.6_04-150500.3.59.1.x86_64",
"product_id": "xen-devel-4.17.6_04-150500.3.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.17.6_04-150500.3.59.1.x86_64",
"product": {
"name": "xen-doc-html-4.17.6_04-150500.3.59.1.x86_64",
"product_id": "xen-doc-html-4.17.6_04-150500.3.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.17.6_04-150500.3.59.1.x86_64",
"product": {
"name": "xen-libs-4.17.6_04-150500.3.59.1.x86_64",
"product_id": "xen-libs-4.17.6_04-150500.3.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.17.6_04-150500.3.59.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.17.6_04-150500.3.59.1.x86_64",
"product_id": "xen-libs-32bit-4.17.6_04-150500.3.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.17.6_04-150500.3.59.1.x86_64",
"product": {
"name": "xen-tools-4.17.6_04-150500.3.59.1.x86_64",
"product_id": "xen-tools-4.17.6_04-150500.3.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.17.6_04-150500.3.59.1.x86_64",
"product": {
"name": "xen-tools-domU-4.17.6_04-150500.3.59.1.x86_64",
"product_id": "xen-tools-domU-4.17.6_04-150500.3.59.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.17.6_04-150500.3.59.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.6_04-150500.3.59.1.x86_64"
},
"product_reference": "xen-libs-4.17.6_04-150500.3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-58150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58150"
}
],
"notes": [
{
"category": "general",
"text": "Shadow mode tracing code uses a set of per-CPU variables to avoid\ncumbersome parameter passing. Some of these variables are written to\nwith guest controlled data, of guest controllable size. That size can\nbe larger than the variable, and bounding of the writes was missing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.6_04-150500.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58150",
"url": "https://www.suse.com/security/cve/CVE-2025-58150"
},
{
"category": "external",
"summary": "SUSE Bug 1256745 for CVE-2025-58150",
"url": "https://bugzilla.suse.com/1256745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.6_04-150500.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.6_04-150500.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-27T16:14:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-58150"
},
{
"cve": "CVE-2026-23553",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23553"
}
],
"notes": [
{
"category": "general",
"text": "In the context switch logic Xen attempts to skip an IBPB in the case of\na vCPU returning to a CPU on which it was the previous vCPU to run.\nWhile safe for Xen\u0027s isolation between vCPUs, this prevents the guest\nkernel correctly isolating between tasks. Consider:\n\n 1) vCPU runs on CPU A, running task 1.\n 2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB.\n 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB.\n 4) vCPU moves back to CPU A. Xen skips IBPB again.\n\nNow, task 2 is running on CPU A with task 1\u0027s training still in the BTB.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.6_04-150500.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23553",
"url": "https://www.suse.com/security/cve/CVE-2026-23553"
},
{
"category": "external",
"summary": "SUSE Bug 1256747 for CVE-2026-23553",
"url": "https://bugzilla.suse.com/1256747"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.6_04-150500.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.6_04-150500.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-27T16:14:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23553"
}
]
}
SUSE-SU-2026:0303-1
Vulnerability from csaf_suse - Published: 2026-01-27 16:14 - Updated: 2026-01-27 16:14Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
Security fixes:
- CVE-2025-58150: Fixed buffer overrun with shadow paging and
tracing (XSA-477) (bsc#1256745)
- CVE-2026-23553: Fixed incomplete IBPB for vCPU isolation
(XSA-479) (bsc#1256747)
- CVE-2025-58149: Fixed incorrect removal od permissions on PCI
device unplug allow PV guests to access memory of devices no
longer assigned to it (XSA-476) (bsc#1252692)
- CVE-2025-27466, CVE-2025-58142, CVE-2025-58143: Fixed multiple
vulnerabilities in the Viridian interface (XSA-472) (bsc#1248807)
Other fixes:
- Fixed virtxend service restart. Caused by a failure to start
xenstored (bsc#1254180)
Patchnames
SUSE-2026-303,SUSE-SUSE-MicroOS-5.2-2026-303
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\nSecurity fixes:\n \n- CVE-2025-58150: Fixed buffer overrun with shadow paging and \n tracing (XSA-477) (bsc#1256745)\n- CVE-2026-23553: Fixed incomplete IBPB for vCPU isolation \n (XSA-479) (bsc#1256747)\n- CVE-2025-58149: Fixed incorrect removal od permissions on PCI\n device unplug allow PV guests to access memory of devices no \n longer assigned to it (XSA-476) (bsc#1252692)\n- CVE-2025-27466, CVE-2025-58142, CVE-2025-58143: Fixed multiple\n vulnerabilities in the Viridian interface (XSA-472) (bsc#1248807)\n\nOther fixes:\n\n- Fixed virtxend service restart. Caused by a failure to start \n xenstored (bsc#1254180)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-303,SUSE-SUSE-MicroOS-5.2-2026-303",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0303-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0303-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260303-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0303-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023931.html"
},
{
"category": "self",
"summary": "SUSE Bug 1248807",
"url": "https://bugzilla.suse.com/1248807"
},
{
"category": "self",
"summary": "SUSE Bug 1252692",
"url": "https://bugzilla.suse.com/1252692"
},
{
"category": "self",
"summary": "SUSE Bug 1254180",
"url": "https://bugzilla.suse.com/1254180"
},
{
"category": "self",
"summary": "SUSE Bug 1256745",
"url": "https://bugzilla.suse.com/1256745"
},
{
"category": "self",
"summary": "SUSE Bug 1256747",
"url": "https://bugzilla.suse.com/1256747"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-27466 page",
"url": "https://www.suse.com/security/cve/CVE-2025-27466/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58142 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58143 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58143/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58150 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23553 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23553/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2026-01-27T16:14:45Z",
"generator": {
"date": "2026-01-27T16:14:45Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0303-1",
"initial_release_date": "2026-01-27T16:14:45Z",
"revision_history": [
{
"date": "2026-01-27T16:14:45Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.14.6_28-150300.3.94.1.aarch64",
"product": {
"name": "xen-4.14.6_28-150300.3.94.1.aarch64",
"product_id": "xen-4.14.6_28-150300.3.94.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.14.6_28-150300.3.94.1.aarch64",
"product": {
"name": "xen-devel-4.14.6_28-150300.3.94.1.aarch64",
"product_id": "xen-devel-4.14.6_28-150300.3.94.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.14.6_28-150300.3.94.1.aarch64",
"product": {
"name": "xen-doc-html-4.14.6_28-150300.3.94.1.aarch64",
"product_id": "xen-doc-html-4.14.6_28-150300.3.94.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.14.6_28-150300.3.94.1.aarch64",
"product": {
"name": "xen-libs-4.14.6_28-150300.3.94.1.aarch64",
"product_id": "xen-libs-4.14.6_28-150300.3.94.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.14.6_28-150300.3.94.1.aarch64",
"product": {
"name": "xen-tools-4.14.6_28-150300.3.94.1.aarch64",
"product_id": "xen-tools-4.14.6_28-150300.3.94.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.14.6_28-150300.3.94.1.aarch64",
"product": {
"name": "xen-tools-domU-4.14.6_28-150300.3.94.1.aarch64",
"product_id": "xen-tools-domU-4.14.6_28-150300.3.94.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-libs-64bit-4.14.6_28-150300.3.94.1.aarch64_ilp32",
"product": {
"name": "xen-libs-64bit-4.14.6_28-150300.3.94.1.aarch64_ilp32",
"product_id": "xen-libs-64bit-4.14.6_28-150300.3.94.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.14.6_28-150300.3.94.1.i586",
"product": {
"name": "xen-devel-4.14.6_28-150300.3.94.1.i586",
"product_id": "xen-devel-4.14.6_28-150300.3.94.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.14.6_28-150300.3.94.1.i586",
"product": {
"name": "xen-libs-4.14.6_28-150300.3.94.1.i586",
"product_id": "xen-libs-4.14.6_28-150300.3.94.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.14.6_28-150300.3.94.1.i586",
"product": {
"name": "xen-tools-domU-4.14.6_28-150300.3.94.1.i586",
"product_id": "xen-tools-domU-4.14.6_28-150300.3.94.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.14.6_28-150300.3.94.1.noarch",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.14.6_28-150300.3.94.1.noarch",
"product_id": "xen-tools-xendomains-wait-disk-4.14.6_28-150300.3.94.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.14.6_28-150300.3.94.1.x86_64",
"product": {
"name": "xen-4.14.6_28-150300.3.94.1.x86_64",
"product_id": "xen-4.14.6_28-150300.3.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.14.6_28-150300.3.94.1.x86_64",
"product": {
"name": "xen-devel-4.14.6_28-150300.3.94.1.x86_64",
"product_id": "xen-devel-4.14.6_28-150300.3.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.14.6_28-150300.3.94.1.x86_64",
"product": {
"name": "xen-doc-html-4.14.6_28-150300.3.94.1.x86_64",
"product_id": "xen-doc-html-4.14.6_28-150300.3.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.14.6_28-150300.3.94.1.x86_64",
"product": {
"name": "xen-libs-4.14.6_28-150300.3.94.1.x86_64",
"product_id": "xen-libs-4.14.6_28-150300.3.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.14.6_28-150300.3.94.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.14.6_28-150300.3.94.1.x86_64",
"product_id": "xen-libs-32bit-4.14.6_28-150300.3.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.14.6_28-150300.3.94.1.x86_64",
"product": {
"name": "xen-tools-4.14.6_28-150300.3.94.1.x86_64",
"product_id": "xen-tools-4.14.6_28-150300.3.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.14.6_28-150300.3.94.1.x86_64",
"product": {
"name": "xen-tools-domU-4.14.6_28-150300.3.94.1.x86_64",
"product_id": "xen-tools-domU-4.14.6_28-150300.3.94.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.14.6_28-150300.3.94.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
},
"product_reference": "xen-libs-4.14.6_28-150300.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-27466",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-27466"
}
],
"notes": [
{
"category": "general",
"text": "[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nThere are multiple issues related to the handling and accessing of guest\nmemory pages in the viridian code:\n\n 1. A NULL pointer dereference in the updating of the reference TSC area.\n This is CVE-2025-27466.\n\n 2. A NULL pointer dereference by assuming the SIM page is mapped when\n a synthetic timer message has to be delivered. This is\n CVE-2025-58142.\n\n 3. A race in the mapping of the reference TSC page, where a guest can\n get Xen to free a page while still present in the guest physical to\n machine (p2m) page tables. This is CVE-2025-58143.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-27466",
"url": "https://www.suse.com/security/cve/CVE-2025-27466"
},
{
"category": "external",
"summary": "SUSE Bug 1248807 for CVE-2025-27466",
"url": "https://bugzilla.suse.com/1248807"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-27T16:14:45Z",
"details": "important"
}
],
"title": "CVE-2025-27466"
},
{
"cve": "CVE-2025-58142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58142"
}
],
"notes": [
{
"category": "general",
"text": "[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nThere are multiple issues related to the handling and accessing of guest\nmemory pages in the viridian code:\n\n 1. A NULL pointer dereference in the updating of the reference TSC area.\n This is CVE-2025-27466.\n\n 2. A NULL pointer dereference by assuming the SIM page is mapped when\n a synthetic timer message has to be delivered. This is\n CVE-2025-58142.\n\n 3. A race in the mapping of the reference TSC page, where a guest can\n get Xen to free a page while still present in the guest physical to\n machine (p2m) page tables. This is CVE-2025-58143.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58142",
"url": "https://www.suse.com/security/cve/CVE-2025-58142"
},
{
"category": "external",
"summary": "SUSE Bug 1248807 for CVE-2025-58142",
"url": "https://bugzilla.suse.com/1248807"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-27T16:14:45Z",
"details": "important"
}
],
"title": "CVE-2025-58142"
},
{
"cve": "CVE-2025-58143",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58143"
}
],
"notes": [
{
"category": "general",
"text": "[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nThere are multiple issues related to the handling and accessing of guest\nmemory pages in the viridian code:\n\n 1. A NULL pointer dereference in the updating of the reference TSC area.\n This is CVE-2025-27466.\n\n 2. A NULL pointer dereference by assuming the SIM page is mapped when\n a synthetic timer message has to be delivered. This is\n CVE-2025-58142.\n\n 3. A race in the mapping of the reference TSC page, where a guest can\n get Xen to free a page while still present in the guest physical to\n machine (p2m) page tables. This is CVE-2025-58143.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58143",
"url": "https://www.suse.com/security/cve/CVE-2025-58143"
},
{
"category": "external",
"summary": "SUSE Bug 1248807 for CVE-2025-58143",
"url": "https://bugzilla.suse.com/1248807"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-27T16:14:45Z",
"details": "important"
}
],
"title": "CVE-2025-58143"
},
{
"cve": "CVE-2025-58149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58149"
}
],
"notes": [
{
"category": "general",
"text": "When passing through PCI devices, the detach logic in libxl won\u0027t remove\naccess permissions to any 64bit memory BARs the device might have. As a\nresult a domain can still have access any 64bit memory BAR when such\ndevice is no longer assigned to the domain.\n\nFor PV domains the permission leak allows the domain itself to map the memory\nin the page-tables. For HVM it would require a compromised device model or\nstubdomain to map the leaked memory into the HVM domain p2m.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58149",
"url": "https://www.suse.com/security/cve/CVE-2025-58149"
},
{
"category": "external",
"summary": "SUSE Bug 1252692 for CVE-2025-58149",
"url": "https://bugzilla.suse.com/1252692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-27T16:14:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-58149"
},
{
"cve": "CVE-2025-58150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58150"
}
],
"notes": [
{
"category": "general",
"text": "Shadow mode tracing code uses a set of per-CPU variables to avoid\ncumbersome parameter passing. Some of these variables are written to\nwith guest controlled data, of guest controllable size. That size can\nbe larger than the variable, and bounding of the writes was missing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58150",
"url": "https://www.suse.com/security/cve/CVE-2025-58150"
},
{
"category": "external",
"summary": "SUSE Bug 1256745 for CVE-2025-58150",
"url": "https://bugzilla.suse.com/1256745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-27T16:14:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-58150"
},
{
"cve": "CVE-2026-23553",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23553"
}
],
"notes": [
{
"category": "general",
"text": "In the context switch logic Xen attempts to skip an IBPB in the case of\na vCPU returning to a CPU on which it was the previous vCPU to run.\nWhile safe for Xen\u0027s isolation between vCPUs, this prevents the guest\nkernel correctly isolating between tasks. Consider:\n\n 1) vCPU runs on CPU A, running task 1.\n 2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB.\n 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB.\n 4) vCPU moves back to CPU A. Xen skips IBPB again.\n\nNow, task 2 is running on CPU A with task 1\u0027s training still in the BTB.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23553",
"url": "https://www.suse.com/security/cve/CVE-2026-23553"
},
{
"category": "external",
"summary": "SUSE Bug 1256747 for CVE-2026-23553",
"url": "https://bugzilla.suse.com/1256747"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-27T16:14:45Z",
"details": "moderate"
}
],
"title": "CVE-2026-23553"
}
]
}
SUSE-SU-2026:0306-1
Vulnerability from csaf_suse - Published: 2026-01-27 16:15 - Updated: 2026-01-27 16:15Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2025-58150: Fixed buffer overrun with shadow paging and
tracing (XSA-477) (bsc#1256745)
- CVE-2026-23553: Fixed incomplete IBPB for vCPU isolation
(XSA-479) (bsc#1256747)
Patchnames
SUSE-2026-306,openSUSE-SLE-15.6-2026-306
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\n- CVE-2025-58150: Fixed buffer overrun with shadow paging and \n tracing (XSA-477) (bsc#1256745)\n- CVE-2026-23553: Fixed incomplete IBPB for vCPU isolation \n (XSA-479) (bsc#1256747)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-306,openSUSE-SLE-15.6-2026-306",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0306-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0306-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260306-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0306-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023928.html"
},
{
"category": "self",
"summary": "SUSE Bug 1256745",
"url": "https://bugzilla.suse.com/1256745"
},
{
"category": "self",
"summary": "SUSE Bug 1256747",
"url": "https://bugzilla.suse.com/1256747"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58150 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23553 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23553/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2026-01-27T16:15:19Z",
"generator": {
"date": "2026-01-27T16:15:19Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0306-1",
"initial_release_date": "2026-01-27T16:15:19Z",
"revision_history": [
{
"date": "2026-01-27T16:15:19Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.18.5_10-150600.3.37.1.aarch64",
"product": {
"name": "xen-4.18.5_10-150600.3.37.1.aarch64",
"product_id": "xen-4.18.5_10-150600.3.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.18.5_10-150600.3.37.1.aarch64",
"product": {
"name": "xen-devel-4.18.5_10-150600.3.37.1.aarch64",
"product_id": "xen-devel-4.18.5_10-150600.3.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.18.5_10-150600.3.37.1.aarch64",
"product": {
"name": "xen-doc-html-4.18.5_10-150600.3.37.1.aarch64",
"product_id": "xen-doc-html-4.18.5_10-150600.3.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.18.5_10-150600.3.37.1.aarch64",
"product": {
"name": "xen-libs-4.18.5_10-150600.3.37.1.aarch64",
"product_id": "xen-libs-4.18.5_10-150600.3.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.18.5_10-150600.3.37.1.aarch64",
"product": {
"name": "xen-tools-4.18.5_10-150600.3.37.1.aarch64",
"product_id": "xen-tools-4.18.5_10-150600.3.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.18.5_10-150600.3.37.1.aarch64",
"product": {
"name": "xen-tools-domU-4.18.5_10-150600.3.37.1.aarch64",
"product_id": "xen-tools-domU-4.18.5_10-150600.3.37.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-libs-64bit-4.18.5_10-150600.3.37.1.aarch64_ilp32",
"product": {
"name": "xen-libs-64bit-4.18.5_10-150600.3.37.1.aarch64_ilp32",
"product_id": "xen-libs-64bit-4.18.5_10-150600.3.37.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.18.5_10-150600.3.37.1.i586",
"product": {
"name": "xen-devel-4.18.5_10-150600.3.37.1.i586",
"product_id": "xen-devel-4.18.5_10-150600.3.37.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.18.5_10-150600.3.37.1.i586",
"product": {
"name": "xen-libs-4.18.5_10-150600.3.37.1.i586",
"product_id": "xen-libs-4.18.5_10-150600.3.37.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.18.5_10-150600.3.37.1.i586",
"product": {
"name": "xen-tools-domU-4.18.5_10-150600.3.37.1.i586",
"product_id": "xen-tools-domU-4.18.5_10-150600.3.37.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.18.5_10-150600.3.37.1.noarch",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.18.5_10-150600.3.37.1.noarch",
"product_id": "xen-tools-xendomains-wait-disk-4.18.5_10-150600.3.37.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.18.5_10-150600.3.37.1.x86_64",
"product": {
"name": "xen-4.18.5_10-150600.3.37.1.x86_64",
"product_id": "xen-4.18.5_10-150600.3.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.18.5_10-150600.3.37.1.x86_64",
"product": {
"name": "xen-devel-4.18.5_10-150600.3.37.1.x86_64",
"product_id": "xen-devel-4.18.5_10-150600.3.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.18.5_10-150600.3.37.1.x86_64",
"product": {
"name": "xen-doc-html-4.18.5_10-150600.3.37.1.x86_64",
"product_id": "xen-doc-html-4.18.5_10-150600.3.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.18.5_10-150600.3.37.1.x86_64",
"product": {
"name": "xen-libs-4.18.5_10-150600.3.37.1.x86_64",
"product_id": "xen-libs-4.18.5_10-150600.3.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.18.5_10-150600.3.37.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.18.5_10-150600.3.37.1.x86_64",
"product_id": "xen-libs-32bit-4.18.5_10-150600.3.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.18.5_10-150600.3.37.1.x86_64",
"product": {
"name": "xen-tools-4.18.5_10-150600.3.37.1.x86_64",
"product_id": "xen-tools-4.18.5_10-150600.3.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.18.5_10-150600.3.37.1.x86_64",
"product": {
"name": "xen-tools-domU-4.18.5_10-150600.3.37.1.x86_64",
"product_id": "xen-tools-domU-4.18.5_10-150600.3.37.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.18.5_10-150600.3.37.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-4.18.5_10-150600.3.37.1.aarch64"
},
"product_reference": "xen-4.18.5_10-150600.3.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.18.5_10-150600.3.37.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-4.18.5_10-150600.3.37.1.x86_64"
},
"product_reference": "xen-4.18.5_10-150600.3.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.18.5_10-150600.3.37.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-devel-4.18.5_10-150600.3.37.1.aarch64"
},
"product_reference": "xen-devel-4.18.5_10-150600.3.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.18.5_10-150600.3.37.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-devel-4.18.5_10-150600.3.37.1.x86_64"
},
"product_reference": "xen-devel-4.18.5_10-150600.3.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.18.5_10-150600.3.37.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-doc-html-4.18.5_10-150600.3.37.1.aarch64"
},
"product_reference": "xen-doc-html-4.18.5_10-150600.3.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.18.5_10-150600.3.37.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-doc-html-4.18.5_10-150600.3.37.1.x86_64"
},
"product_reference": "xen-doc-html-4.18.5_10-150600.3.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.18.5_10-150600.3.37.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-libs-4.18.5_10-150600.3.37.1.aarch64"
},
"product_reference": "xen-libs-4.18.5_10-150600.3.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.18.5_10-150600.3.37.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-libs-4.18.5_10-150600.3.37.1.x86_64"
},
"product_reference": "xen-libs-4.18.5_10-150600.3.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.18.5_10-150600.3.37.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-libs-32bit-4.18.5_10-150600.3.37.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.18.5_10-150600.3.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.18.5_10-150600.3.37.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-tools-4.18.5_10-150600.3.37.1.aarch64"
},
"product_reference": "xen-tools-4.18.5_10-150600.3.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.18.5_10-150600.3.37.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-tools-4.18.5_10-150600.3.37.1.x86_64"
},
"product_reference": "xen-tools-4.18.5_10-150600.3.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.18.5_10-150600.3.37.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-tools-domU-4.18.5_10-150600.3.37.1.aarch64"
},
"product_reference": "xen-tools-domU-4.18.5_10-150600.3.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.18.5_10-150600.3.37.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-tools-domU-4.18.5_10-150600.3.37.1.x86_64"
},
"product_reference": "xen-tools-domU-4.18.5_10-150600.3.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.18.5_10-150600.3.37.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_10-150600.3.37.1.noarch"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.18.5_10-150600.3.37.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-58150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58150"
}
],
"notes": [
{
"category": "general",
"text": "Shadow mode tracing code uses a set of per-CPU variables to avoid\ncumbersome parameter passing. Some of these variables are written to\nwith guest controlled data, of guest controllable size. That size can\nbe larger than the variable, and bounding of the writes was missing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.6:xen-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_10-150600.3.37.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58150",
"url": "https://www.suse.com/security/cve/CVE-2025-58150"
},
{
"category": "external",
"summary": "SUSE Bug 1256745 for CVE-2025-58150",
"url": "https://bugzilla.suse.com/1256745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.6:xen-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_10-150600.3.37.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.6:xen-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_10-150600.3.37.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-27T16:15:19Z",
"details": "moderate"
}
],
"title": "CVE-2025-58150"
},
{
"cve": "CVE-2026-23553",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23553"
}
],
"notes": [
{
"category": "general",
"text": "In the context switch logic Xen attempts to skip an IBPB in the case of\na vCPU returning to a CPU on which it was the previous vCPU to run.\nWhile safe for Xen\u0027s isolation between vCPUs, this prevents the guest\nkernel correctly isolating between tasks. Consider:\n\n 1) vCPU runs on CPU A, running task 1.\n 2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB.\n 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB.\n 4) vCPU moves back to CPU A. Xen skips IBPB again.\n\nNow, task 2 is running on CPU A with task 1\u0027s training still in the BTB.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.6:xen-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_10-150600.3.37.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23553",
"url": "https://www.suse.com/security/cve/CVE-2026-23553"
},
{
"category": "external",
"summary": "SUSE Bug 1256747 for CVE-2026-23553",
"url": "https://bugzilla.suse.com/1256747"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.6:xen-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_10-150600.3.37.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.6:xen-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_10-150600.3.37.1.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_10-150600.3.37.1.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_10-150600.3.37.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-27T16:15:19Z",
"details": "moderate"
}
],
"title": "CVE-2026-23553"
}
]
}
SUSE-SU-2026:0328-1
Vulnerability from csaf_suse - Published: 2026-01-28 15:39 - Updated: 2026-01-28 15:39Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
Security fixes:
- CVE-2025-58150: Fixed buffer overrun with shadow paging and
tracing (XSA-477) (bsc#1256745)
- CVE-2026-23553: Fixed incomplete IBPB for vCPU isolation
(XSA-479) (bsc#1256747)
- CVE-2025-58149: Fixed incorrect removal od permissions on PCI
device unplug allow PV guests to access memory of devices no
longer assigned to it (XSA-476) (bsc#1252692)
Patchnames
SUSE-2026-328,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-328
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\nSecurity fixes:\n \n- CVE-2025-58150: Fixed buffer overrun with shadow paging and \n tracing (XSA-477) (bsc#1256745)\n- CVE-2026-23553: Fixed incomplete IBPB for vCPU isolation \n (XSA-479) (bsc#1256747)\n- CVE-2025-58149: Fixed incorrect removal od permissions on PCI\n device unplug allow PV guests to access memory of devices no \n longer assigned to it (XSA-476) (bsc#1252692)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-328,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-328",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0328-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0328-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260328-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0328-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023973.html"
},
{
"category": "self",
"summary": "SUSE Bug 1252692",
"url": "https://bugzilla.suse.com/1252692"
},
{
"category": "self",
"summary": "SUSE Bug 1256745",
"url": "https://bugzilla.suse.com/1256745"
},
{
"category": "self",
"summary": "SUSE Bug 1256747",
"url": "https://bugzilla.suse.com/1256747"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58150 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23553 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23553/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2026-01-28T15:39:28Z",
"generator": {
"date": "2026-01-28T15:39:28Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0328-1",
"initial_release_date": "2026-01-28T15:39:28Z",
"revision_history": [
{
"date": "2026-01-28T15:39:28Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.12.4_64-3.137.1.aarch64",
"product": {
"name": "xen-4.12.4_64-3.137.1.aarch64",
"product_id": "xen-4.12.4_64-3.137.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.12.4_64-3.137.1.aarch64",
"product": {
"name": "xen-devel-4.12.4_64-3.137.1.aarch64",
"product_id": "xen-devel-4.12.4_64-3.137.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.12.4_64-3.137.1.aarch64",
"product": {
"name": "xen-doc-html-4.12.4_64-3.137.1.aarch64",
"product_id": "xen-doc-html-4.12.4_64-3.137.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.12.4_64-3.137.1.aarch64",
"product": {
"name": "xen-libs-4.12.4_64-3.137.1.aarch64",
"product_id": "xen-libs-4.12.4_64-3.137.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.12.4_64-3.137.1.aarch64",
"product": {
"name": "xen-tools-4.12.4_64-3.137.1.aarch64",
"product_id": "xen-tools-4.12.4_64-3.137.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.12.4_64-3.137.1.aarch64",
"product": {
"name": "xen-tools-domU-4.12.4_64-3.137.1.aarch64",
"product_id": "xen-tools-domU-4.12.4_64-3.137.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-libs-64bit-4.12.4_64-3.137.1.aarch64_ilp32",
"product": {
"name": "xen-libs-64bit-4.12.4_64-3.137.1.aarch64_ilp32",
"product_id": "xen-libs-64bit-4.12.4_64-3.137.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.12.4_64-3.137.1.i586",
"product": {
"name": "xen-devel-4.12.4_64-3.137.1.i586",
"product_id": "xen-devel-4.12.4_64-3.137.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.12.4_64-3.137.1.i586",
"product": {
"name": "xen-libs-4.12.4_64-3.137.1.i586",
"product_id": "xen-libs-4.12.4_64-3.137.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.12.4_64-3.137.1.i586",
"product": {
"name": "xen-tools-domU-4.12.4_64-3.137.1.i586",
"product_id": "xen-tools-domU-4.12.4_64-3.137.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.12.4_64-3.137.1.x86_64",
"product": {
"name": "xen-4.12.4_64-3.137.1.x86_64",
"product_id": "xen-4.12.4_64-3.137.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.12.4_64-3.137.1.x86_64",
"product": {
"name": "xen-devel-4.12.4_64-3.137.1.x86_64",
"product_id": "xen-devel-4.12.4_64-3.137.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.12.4_64-3.137.1.x86_64",
"product": {
"name": "xen-doc-html-4.12.4_64-3.137.1.x86_64",
"product_id": "xen-doc-html-4.12.4_64-3.137.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.12.4_64-3.137.1.x86_64",
"product": {
"name": "xen-libs-4.12.4_64-3.137.1.x86_64",
"product_id": "xen-libs-4.12.4_64-3.137.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.12.4_64-3.137.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.12.4_64-3.137.1.x86_64",
"product_id": "xen-libs-32bit-4.12.4_64-3.137.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.12.4_64-3.137.1.x86_64",
"product": {
"name": "xen-tools-4.12.4_64-3.137.1.x86_64",
"product_id": "xen-tools-4.12.4_64-3.137.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.12.4_64-3.137.1.x86_64",
"product": {
"name": "xen-tools-domU-4.12.4_64-3.137.1.x86_64",
"product_id": "xen-tools-domU-4.12.4_64-3.137.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.12.4_64-3.137.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-4.12.4_64-3.137.1.x86_64"
},
"product_reference": "xen-4.12.4_64-3.137.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.12.4_64-3.137.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-devel-4.12.4_64-3.137.1.x86_64"
},
"product_reference": "xen-devel-4.12.4_64-3.137.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.12.4_64-3.137.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-doc-html-4.12.4_64-3.137.1.x86_64"
},
"product_reference": "xen-doc-html-4.12.4_64-3.137.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.12.4_64-3.137.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-4.12.4_64-3.137.1.x86_64"
},
"product_reference": "xen-libs-4.12.4_64-3.137.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.12.4_64-3.137.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-32bit-4.12.4_64-3.137.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.12.4_64-3.137.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.12.4_64-3.137.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-4.12.4_64-3.137.1.x86_64"
},
"product_reference": "xen-tools-4.12.4_64-3.137.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.12.4_64-3.137.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-domU-4.12.4_64-3.137.1.x86_64"
},
"product_reference": "xen-tools-domU-4.12.4_64-3.137.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-58149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58149"
}
],
"notes": [
{
"category": "general",
"text": "When passing through PCI devices, the detach logic in libxl won\u0027t remove\naccess permissions to any 64bit memory BARs the device might have. As a\nresult a domain can still have access any 64bit memory BAR when such\ndevice is no longer assigned to the domain.\n\nFor PV domains the permission leak allows the domain itself to map the memory\nin the page-tables. For HVM it would require a compromised device model or\nstubdomain to map the leaked memory into the HVM domain p2m.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-devel-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-doc-html-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-32bit-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-domU-4.12.4_64-3.137.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58149",
"url": "https://www.suse.com/security/cve/CVE-2025-58149"
},
{
"category": "external",
"summary": "SUSE Bug 1252692 for CVE-2025-58149",
"url": "https://bugzilla.suse.com/1252692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-devel-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-doc-html-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-32bit-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-domU-4.12.4_64-3.137.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-devel-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-doc-html-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-32bit-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-domU-4.12.4_64-3.137.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T15:39:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-58149"
},
{
"cve": "CVE-2025-58150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58150"
}
],
"notes": [
{
"category": "general",
"text": "Shadow mode tracing code uses a set of per-CPU variables to avoid\ncumbersome parameter passing. Some of these variables are written to\nwith guest controlled data, of guest controllable size. That size can\nbe larger than the variable, and bounding of the writes was missing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-devel-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-doc-html-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-32bit-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-domU-4.12.4_64-3.137.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58150",
"url": "https://www.suse.com/security/cve/CVE-2025-58150"
},
{
"category": "external",
"summary": "SUSE Bug 1256745 for CVE-2025-58150",
"url": "https://bugzilla.suse.com/1256745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-devel-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-doc-html-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-32bit-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-domU-4.12.4_64-3.137.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-devel-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-doc-html-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-32bit-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-domU-4.12.4_64-3.137.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T15:39:28Z",
"details": "moderate"
}
],
"title": "CVE-2025-58150"
},
{
"cve": "CVE-2026-23553",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23553"
}
],
"notes": [
{
"category": "general",
"text": "In the context switch logic Xen attempts to skip an IBPB in the case of\na vCPU returning to a CPU on which it was the previous vCPU to run.\nWhile safe for Xen\u0027s isolation between vCPUs, this prevents the guest\nkernel correctly isolating between tasks. Consider:\n\n 1) vCPU runs on CPU A, running task 1.\n 2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB.\n 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB.\n 4) vCPU moves back to CPU A. Xen skips IBPB again.\n\nNow, task 2 is running on CPU A with task 1\u0027s training still in the BTB.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-devel-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-doc-html-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-32bit-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-domU-4.12.4_64-3.137.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23553",
"url": "https://www.suse.com/security/cve/CVE-2026-23553"
},
{
"category": "external",
"summary": "SUSE Bug 1256747 for CVE-2026-23553",
"url": "https://bugzilla.suse.com/1256747"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-devel-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-doc-html-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-32bit-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-domU-4.12.4_64-3.137.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-devel-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-doc-html-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-32bit-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-libs-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-4.12.4_64-3.137.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xen-tools-domU-4.12.4_64-3.137.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T15:39:28Z",
"details": "moderate"
}
],
"title": "CVE-2026-23553"
}
]
}
SUSE-SU-2026:0394-1
Vulnerability from csaf_suse - Published: 2026-02-05 15:42 - Updated: 2026-02-05 15:42Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
Security fixes:
- CVE-2025-58150: Fixed buffer overrun with shadow paging and
tracing (XSA-477) (bsc#1256745)
- CVE-2026-23553: Fixed incomplete IBPB for vCPU isolation
(XSA-479) (bsc#1256747)
- CVE-2025-58149: Fixed incorrect removal od permissions on PCI
device unplug allow PV guests to access memory of devices no
longer assigned to it (XSA-476) (bsc#1252692)
Other fixes:
- Fixed virtxend service restart. Caused by a failure to start
xenstored (bsc#1254180)
Patchnames
SUSE-2026-394,SUSE-SLE-Micro-5.3-2026-394,SUSE-SLE-Micro-5.4-2026-394
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\nSecurity fixes:\n \n- CVE-2025-58150: Fixed buffer overrun with shadow paging and \n tracing (XSA-477) (bsc#1256745)\n- CVE-2026-23553: Fixed incomplete IBPB for vCPU isolation \n (XSA-479) (bsc#1256747)\n- CVE-2025-58149: Fixed incorrect removal od permissions on PCI\n device unplug allow PV guests to access memory of devices no \n longer assigned to it (XSA-476) (bsc#1252692)\n\nOther fixes:\n\n- Fixed virtxend service restart. Caused by a failure to start \n xenstored (bsc#1254180)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-394,SUSE-SLE-Micro-5.3-2026-394,SUSE-SLE-Micro-5.4-2026-394",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0394-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0394-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260394-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0394-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024075.html"
},
{
"category": "self",
"summary": "SUSE Bug 1252692",
"url": "https://bugzilla.suse.com/1252692"
},
{
"category": "self",
"summary": "SUSE Bug 1254180",
"url": "https://bugzilla.suse.com/1254180"
},
{
"category": "self",
"summary": "SUSE Bug 1256745",
"url": "https://bugzilla.suse.com/1256745"
},
{
"category": "self",
"summary": "SUSE Bug 1256747",
"url": "https://bugzilla.suse.com/1256747"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58150 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23553 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23553/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2026-02-05T15:42:11Z",
"generator": {
"date": "2026-02-05T15:42:11Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0394-1",
"initial_release_date": "2026-02-05T15:42:11Z",
"revision_history": [
{
"date": "2026-02-05T15:42:11Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.16.7_06-150400.4.78.1.aarch64",
"product": {
"name": "xen-4.16.7_06-150400.4.78.1.aarch64",
"product_id": "xen-4.16.7_06-150400.4.78.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.16.7_06-150400.4.78.1.aarch64",
"product": {
"name": "xen-devel-4.16.7_06-150400.4.78.1.aarch64",
"product_id": "xen-devel-4.16.7_06-150400.4.78.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.16.7_06-150400.4.78.1.aarch64",
"product": {
"name": "xen-doc-html-4.16.7_06-150400.4.78.1.aarch64",
"product_id": "xen-doc-html-4.16.7_06-150400.4.78.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.16.7_06-150400.4.78.1.aarch64",
"product": {
"name": "xen-libs-4.16.7_06-150400.4.78.1.aarch64",
"product_id": "xen-libs-4.16.7_06-150400.4.78.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.16.7_06-150400.4.78.1.aarch64",
"product": {
"name": "xen-tools-4.16.7_06-150400.4.78.1.aarch64",
"product_id": "xen-tools-4.16.7_06-150400.4.78.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.16.7_06-150400.4.78.1.aarch64",
"product": {
"name": "xen-tools-domU-4.16.7_06-150400.4.78.1.aarch64",
"product_id": "xen-tools-domU-4.16.7_06-150400.4.78.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-libs-64bit-4.16.7_06-150400.4.78.1.aarch64_ilp32",
"product": {
"name": "xen-libs-64bit-4.16.7_06-150400.4.78.1.aarch64_ilp32",
"product_id": "xen-libs-64bit-4.16.7_06-150400.4.78.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.16.7_06-150400.4.78.1.i586",
"product": {
"name": "xen-devel-4.16.7_06-150400.4.78.1.i586",
"product_id": "xen-devel-4.16.7_06-150400.4.78.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.16.7_06-150400.4.78.1.i586",
"product": {
"name": "xen-libs-4.16.7_06-150400.4.78.1.i586",
"product_id": "xen-libs-4.16.7_06-150400.4.78.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.16.7_06-150400.4.78.1.i586",
"product": {
"name": "xen-tools-domU-4.16.7_06-150400.4.78.1.i586",
"product_id": "xen-tools-domU-4.16.7_06-150400.4.78.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.16.7_06-150400.4.78.1.noarch",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.16.7_06-150400.4.78.1.noarch",
"product_id": "xen-tools-xendomains-wait-disk-4.16.7_06-150400.4.78.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.16.7_06-150400.4.78.1.x86_64",
"product": {
"name": "xen-4.16.7_06-150400.4.78.1.x86_64",
"product_id": "xen-4.16.7_06-150400.4.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.16.7_06-150400.4.78.1.x86_64",
"product": {
"name": "xen-devel-4.16.7_06-150400.4.78.1.x86_64",
"product_id": "xen-devel-4.16.7_06-150400.4.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.16.7_06-150400.4.78.1.x86_64",
"product": {
"name": "xen-doc-html-4.16.7_06-150400.4.78.1.x86_64",
"product_id": "xen-doc-html-4.16.7_06-150400.4.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.16.7_06-150400.4.78.1.x86_64",
"product": {
"name": "xen-libs-4.16.7_06-150400.4.78.1.x86_64",
"product_id": "xen-libs-4.16.7_06-150400.4.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.16.7_06-150400.4.78.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.16.7_06-150400.4.78.1.x86_64",
"product_id": "xen-libs-32bit-4.16.7_06-150400.4.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.16.7_06-150400.4.78.1.x86_64",
"product": {
"name": "xen-tools-4.16.7_06-150400.4.78.1.x86_64",
"product_id": "xen-tools-4.16.7_06-150400.4.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.16.7_06-150400.4.78.1.x86_64",
"product": {
"name": "xen-tools-domU-4.16.7_06-150400.4.78.1.x86_64",
"product_id": "xen-tools-domU-4.16.7_06-150400.4.78.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.16.7_06-150400.4.78.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.7_06-150400.4.78.1.x86_64"
},
"product_reference": "xen-libs-4.16.7_06-150400.4.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.16.7_06-150400.4.78.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.7_06-150400.4.78.1.x86_64"
},
"product_reference": "xen-libs-4.16.7_06-150400.4.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-58149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58149"
}
],
"notes": [
{
"category": "general",
"text": "When passing through PCI devices, the detach logic in libxl won\u0027t remove\naccess permissions to any 64bit memory BARs the device might have. As a\nresult a domain can still have access any 64bit memory BAR when such\ndevice is no longer assigned to the domain.\n\nFor PV domains the permission leak allows the domain itself to map the memory\nin the page-tables. For HVM it would require a compromised device model or\nstubdomain to map the leaked memory into the HVM domain p2m.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.7_06-150400.4.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.7_06-150400.4.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58149",
"url": "https://www.suse.com/security/cve/CVE-2025-58149"
},
{
"category": "external",
"summary": "SUSE Bug 1252692 for CVE-2025-58149",
"url": "https://bugzilla.suse.com/1252692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.7_06-150400.4.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.7_06-150400.4.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.7_06-150400.4.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.7_06-150400.4.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-05T15:42:11Z",
"details": "moderate"
}
],
"title": "CVE-2025-58149"
},
{
"cve": "CVE-2025-58150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58150"
}
],
"notes": [
{
"category": "general",
"text": "Shadow mode tracing code uses a set of per-CPU variables to avoid\ncumbersome parameter passing. Some of these variables are written to\nwith guest controlled data, of guest controllable size. That size can\nbe larger than the variable, and bounding of the writes was missing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.7_06-150400.4.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.7_06-150400.4.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58150",
"url": "https://www.suse.com/security/cve/CVE-2025-58150"
},
{
"category": "external",
"summary": "SUSE Bug 1256745 for CVE-2025-58150",
"url": "https://bugzilla.suse.com/1256745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.7_06-150400.4.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.7_06-150400.4.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.7_06-150400.4.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.7_06-150400.4.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-05T15:42:11Z",
"details": "moderate"
}
],
"title": "CVE-2025-58150"
},
{
"cve": "CVE-2026-23553",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23553"
}
],
"notes": [
{
"category": "general",
"text": "In the context switch logic Xen attempts to skip an IBPB in the case of\na vCPU returning to a CPU on which it was the previous vCPU to run.\nWhile safe for Xen\u0027s isolation between vCPUs, this prevents the guest\nkernel correctly isolating between tasks. Consider:\n\n 1) vCPU runs on CPU A, running task 1.\n 2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB.\n 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB.\n 4) vCPU moves back to CPU A. Xen skips IBPB again.\n\nNow, task 2 is running on CPU A with task 1\u0027s training still in the BTB.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.7_06-150400.4.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.7_06-150400.4.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23553",
"url": "https://www.suse.com/security/cve/CVE-2026-23553"
},
{
"category": "external",
"summary": "SUSE Bug 1256747 for CVE-2026-23553",
"url": "https://bugzilla.suse.com/1256747"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.7_06-150400.4.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.7_06-150400.4.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.7_06-150400.4.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.7_06-150400.4.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-05T15:42:11Z",
"details": "moderate"
}
],
"title": "CVE-2026-23553"
}
]
}
SUSE-SU-2026:0329-1
Vulnerability from csaf_suse - Published: 2026-01-28 15:39 - Updated: 2026-01-28 15:39Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2025-58150: Fixed buffer overrun with shadow paging and
tracing (XSA-477) (bsc#1256745)
- CVE-2026-23553: Fixed incomplete IBPB for vCPU isolation
(XSA-479) (bsc#1256747)
Patchnames
SUSE-2026-329,SUSE-SLE-Module-Basesystem-15-SP7-2026-329,SUSE-SLE-Module-Server-Applications-15-SP7-2026-329
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\n- CVE-2025-58150: Fixed buffer overrun with shadow paging and \n tracing (XSA-477) (bsc#1256745)\n- CVE-2026-23553: Fixed incomplete IBPB for vCPU isolation \n (XSA-479) (bsc#1256747)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-329,SUSE-SLE-Module-Basesystem-15-SP7-2026-329,SUSE-SLE-Module-Server-Applications-15-SP7-2026-329",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0329-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0329-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260329-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0329-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-January/043757.html"
},
{
"category": "self",
"summary": "SUSE Bug 1256745",
"url": "https://bugzilla.suse.com/1256745"
},
{
"category": "self",
"summary": "SUSE Bug 1256747",
"url": "https://bugzilla.suse.com/1256747"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58150 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23553 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23553/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2026-01-28T15:39:40Z",
"generator": {
"date": "2026-01-28T15:39:40Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0329-1",
"initial_release_date": "2026-01-28T15:39:40Z",
"revision_history": [
{
"date": "2026-01-28T15:39:40Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.20.2_04-150700.3.22.1.aarch64",
"product": {
"name": "xen-4.20.2_04-150700.3.22.1.aarch64",
"product_id": "xen-4.20.2_04-150700.3.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.20.2_04-150700.3.22.1.aarch64",
"product": {
"name": "xen-devel-4.20.2_04-150700.3.22.1.aarch64",
"product_id": "xen-devel-4.20.2_04-150700.3.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.20.2_04-150700.3.22.1.aarch64",
"product": {
"name": "xen-doc-html-4.20.2_04-150700.3.22.1.aarch64",
"product_id": "xen-doc-html-4.20.2_04-150700.3.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.20.2_04-150700.3.22.1.aarch64",
"product": {
"name": "xen-libs-4.20.2_04-150700.3.22.1.aarch64",
"product_id": "xen-libs-4.20.2_04-150700.3.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.20.2_04-150700.3.22.1.aarch64",
"product": {
"name": "xen-tools-4.20.2_04-150700.3.22.1.aarch64",
"product_id": "xen-tools-4.20.2_04-150700.3.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.20.2_04-150700.3.22.1.aarch64",
"product": {
"name": "xen-tools-domU-4.20.2_04-150700.3.22.1.aarch64",
"product_id": "xen-tools-domU-4.20.2_04-150700.3.22.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-libs-64bit-4.20.2_04-150700.3.22.1.aarch64_ilp32",
"product": {
"name": "xen-libs-64bit-4.20.2_04-150700.3.22.1.aarch64_ilp32",
"product_id": "xen-libs-64bit-4.20.2_04-150700.3.22.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.20.2_04-150700.3.22.1.i586",
"product": {
"name": "xen-devel-4.20.2_04-150700.3.22.1.i586",
"product_id": "xen-devel-4.20.2_04-150700.3.22.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.20.2_04-150700.3.22.1.i586",
"product": {
"name": "xen-libs-4.20.2_04-150700.3.22.1.i586",
"product_id": "xen-libs-4.20.2_04-150700.3.22.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.20.2_04-150700.3.22.1.i586",
"product": {
"name": "xen-tools-domU-4.20.2_04-150700.3.22.1.i586",
"product_id": "xen-tools-domU-4.20.2_04-150700.3.22.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.20.2_04-150700.3.22.1.noarch",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.20.2_04-150700.3.22.1.noarch",
"product_id": "xen-tools-xendomains-wait-disk-4.20.2_04-150700.3.22.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.20.2_04-150700.3.22.1.x86_64",
"product": {
"name": "xen-4.20.2_04-150700.3.22.1.x86_64",
"product_id": "xen-4.20.2_04-150700.3.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.20.2_04-150700.3.22.1.x86_64",
"product": {
"name": "xen-devel-4.20.2_04-150700.3.22.1.x86_64",
"product_id": "xen-devel-4.20.2_04-150700.3.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.20.2_04-150700.3.22.1.x86_64",
"product": {
"name": "xen-doc-html-4.20.2_04-150700.3.22.1.x86_64",
"product_id": "xen-doc-html-4.20.2_04-150700.3.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.20.2_04-150700.3.22.1.x86_64",
"product": {
"name": "xen-libs-4.20.2_04-150700.3.22.1.x86_64",
"product_id": "xen-libs-4.20.2_04-150700.3.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.20.2_04-150700.3.22.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.20.2_04-150700.3.22.1.x86_64",
"product_id": "xen-libs-32bit-4.20.2_04-150700.3.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.20.2_04-150700.3.22.1.x86_64",
"product": {
"name": "xen-tools-4.20.2_04-150700.3.22.1.x86_64",
"product_id": "xen-tools-4.20.2_04-150700.3.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.20.2_04-150700.3.22.1.x86_64",
"product": {
"name": "xen-tools-domU-4.20.2_04-150700.3.22.1.x86_64",
"product_id": "xen-tools-domU-4.20.2_04-150700.3.22.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.20.2_04-150700.3.22.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-libs-4.20.2_04-150700.3.22.1.x86_64"
},
"product_reference": "xen-libs-4.20.2_04-150700.3.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.20.2_04-150700.3.22.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-tools-domU-4.20.2_04-150700.3.22.1.x86_64"
},
"product_reference": "xen-tools-domU-4.20.2_04-150700.3.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.20.2_04-150700.3.22.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-4.20.2_04-150700.3.22.1.x86_64"
},
"product_reference": "xen-4.20.2_04-150700.3.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.20.2_04-150700.3.22.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-devel-4.20.2_04-150700.3.22.1.x86_64"
},
"product_reference": "xen-devel-4.20.2_04-150700.3.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.20.2_04-150700.3.22.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-4.20.2_04-150700.3.22.1.x86_64"
},
"product_reference": "xen-tools-4.20.2_04-150700.3.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.20.2_04-150700.3.22.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-xendomains-wait-disk-4.20.2_04-150700.3.22.1.noarch"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.20.2_04-150700.3.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-58150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58150"
}
],
"notes": [
{
"category": "general",
"text": "Shadow mode tracing code uses a set of per-CPU variables to avoid\ncumbersome parameter passing. Some of these variables are written to\nwith guest controlled data, of guest controllable size. That size can\nbe larger than the variable, and bounding of the writes was missing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-libs-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-tools-domU-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-devel-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-xendomains-wait-disk-4.20.2_04-150700.3.22.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58150",
"url": "https://www.suse.com/security/cve/CVE-2025-58150"
},
{
"category": "external",
"summary": "SUSE Bug 1256745 for CVE-2025-58150",
"url": "https://bugzilla.suse.com/1256745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-libs-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-tools-domU-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-devel-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-xendomains-wait-disk-4.20.2_04-150700.3.22.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-libs-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-tools-domU-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-devel-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-xendomains-wait-disk-4.20.2_04-150700.3.22.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T15:39:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-58150"
},
{
"cve": "CVE-2026-23553",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23553"
}
],
"notes": [
{
"category": "general",
"text": "In the context switch logic Xen attempts to skip an IBPB in the case of\na vCPU returning to a CPU on which it was the previous vCPU to run.\nWhile safe for Xen\u0027s isolation between vCPUs, this prevents the guest\nkernel correctly isolating between tasks. Consider:\n\n 1) vCPU runs on CPU A, running task 1.\n 2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB.\n 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB.\n 4) vCPU moves back to CPU A. Xen skips IBPB again.\n\nNow, task 2 is running on CPU A with task 1\u0027s training still in the BTB.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-libs-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-tools-domU-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-devel-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-xendomains-wait-disk-4.20.2_04-150700.3.22.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23553",
"url": "https://www.suse.com/security/cve/CVE-2026-23553"
},
{
"category": "external",
"summary": "SUSE Bug 1256747 for CVE-2026-23553",
"url": "https://bugzilla.suse.com/1256747"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-libs-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-tools-domU-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-devel-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-xendomains-wait-disk-4.20.2_04-150700.3.22.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-libs-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-tools-domU-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-devel-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-4.20.2_04-150700.3.22.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-xendomains-wait-disk-4.20.2_04-150700.3.22.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T15:39:40Z",
"details": "moderate"
}
],
"title": "CVE-2026-23553"
}
]
}
WID-SEC-W-2026-0225
Vulnerability from csaf_certbund - Published: 2026-01-26 23:00 - Updated: 2026-01-28 23:00Summary
Xen: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Xen ist ein Virtueller-Maschinen-Monitor (VMM), der Hardware (x86, IA-64, PowerPC) für die darauf laufenden Systeme (Domains) paravirtualisiert.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in Xen ausnutzen, um seine Rechte zu erweitern und einen nicht näher spezifizierten Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Xen ist ein Virtueller-Maschinen-Monitor (VMM), der Hardware (x86, IA-64, PowerPC) f\u00fcr die darauf laufenden Systeme (Domains) paravirtualisiert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Xen ausnutzen, um seine Rechte zu erweitern und einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0225 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0225.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0225 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0225"
},
{
"category": "external",
"summary": "Xen Security Advisory vom 2026-01-26",
"url": "https://xenbits.xen.org/xsa/advisory-477.html"
},
{
"category": "external",
"summary": "Xen Security Advisory vom 2026-01-26",
"url": "https://xenbits.xen.org/xsa/advisory-478.html"
},
{
"category": "external",
"summary": "Citrix Security Advisory CTX695997 vom 2025-12-12",
"url": "https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX695997\u0026articleURL=XenServer_Security_Update_for_CVE_2025_58151_and_CVE_2026_23553"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0304-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023930.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0303-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023931.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0306-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023928.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0329-1 vom 2026-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023972.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0328-1 vom 2026-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023973.html"
}
],
"source_lang": "en-US",
"title": "Xen: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-01-28T23:00:00.000+00:00",
"generator": {
"date": "2026-01-29T07:51:16.322+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0225",
"initial_release_date": "2026-01-26T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-01-26T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-01-27T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Citrix aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE und European Union Vulnerability Database aufgenommen"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "8.4",
"product": {
"name": "Citrix Systems XenServer 8.4",
"product_id": "T043563",
"product_identification_helper": {
"cpe": "cpe:/a:citrix:xenserver:8.4"
}
}
}
],
"category": "product_name",
"name": "XenServer"
}
],
"category": "vendor",
"name": "Citrix Systems"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c4.18.x",
"product": {
"name": "Open Source Xen \u003c4.18.x",
"product_id": "T038923"
}
},
{
"category": "product_version",
"name": "4.18.x",
"product": {
"name": "Open Source Xen 4.18.x",
"product_id": "T038923-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:xen:xen:4.18.x"
}
}
},
{
"category": "product_version_range",
"name": "\u003c4.19.x",
"product": {
"name": "Open Source Xen \u003c4.19.x",
"product_id": "T038924"
}
},
{
"category": "product_version",
"name": "4.19.x",
"product": {
"name": "Open Source Xen 4.19.x",
"product_id": "T038924-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:xen:xen:4.19.x"
}
}
},
{
"category": "product_version_range",
"name": "\u003cxsa477-4.18.patch",
"product": {
"name": "Open Source Xen \u003cxsa477-4.18.patch",
"product_id": "T050326"
}
},
{
"category": "product_version",
"name": "xsa477-4.18.patch",
"product": {
"name": "Open Source Xen xsa477-4.18.patch",
"product_id": "T050326-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:xen:xen:xsa477-4.18.patch"
}
}
},
{
"category": "product_version_range",
"name": "\u003cxsa478.patch",
"product": {
"name": "Open Source Xen \u003cxsa478.patch",
"product_id": "T050327"
}
},
{
"category": "product_version",
"name": "xsa478.patch",
"product": {
"name": "Open Source Xen xsa478.patch",
"product_id": "T050327-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:xen:xen:xsa478.patch"
}
}
}
],
"category": "product_name",
"name": "Xen"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-58150",
"product_status": {
"known_affected": [
"T002207",
"T038923",
"T050326",
"T038924",
"T043563"
]
},
"release_date": "2026-01-26T23:00:00.000+00:00",
"title": "CVE-2025-58150"
},
{
"cve": "CVE-2025-58151",
"product_status": {
"known_affected": [
"T002207",
"T038923",
"T050327",
"T050326",
"T043563"
]
},
"release_date": "2026-01-26T23:00:00.000+00:00",
"title": "CVE-2025-58151"
}
]
}
FKIE_CVE-2025-58150
Vulnerability from fkie_nvd - Published: 2026-01-28 16:16 - Updated: 2026-01-29 16:31
Severity ?
Summary
Shadow mode tracing code uses a set of per-CPU variables to avoid
cumbersome parameter passing. Some of these variables are written to
with guest controlled data, of guest controllable size. That size can
be larger than the variable, and bounding of the writes was missing.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Shadow mode tracing code uses a set of per-CPU variables to avoid\ncumbersome parameter passing. Some of these variables are written to\nwith guest controlled data, of guest controllable size. That size can\nbe larger than the variable, and bounding of the writes was missing."
}
],
"id": "CVE-2025-58150",
"lastModified": "2026-01-29T16:31:00.867",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.0,
"impactScore": 6.0,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2026-01-28T16:16:12.880",
"references": [
{
"source": "security@xen.org",
"url": "https://xenbits.xenproject.org/xsa/advisory-477.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2026/01/27/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://xenbits.xen.org/xsa/advisory-477.html"
}
],
"sourceIdentifier": "security@xen.org",
"vulnStatus": "Undergoing Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
OPENSUSE-SU-2026:10118-1
Vulnerability from csaf_opensuse - Published: 2026-01-29 00:00 - Updated: 2026-01-29 00:00Summary
xen-4.21.0_04-1.1 on GA media
Notes
Title of the patch
xen-4.21.0_04-1.1 on GA media
Description of the patch
These are all security issues fixed in the xen-4.21.0_04-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2026-10118
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "xen-4.21.0_04-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the xen-4.21.0_04-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10118",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10118-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58150 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23553 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23553/"
}
],
"title": "xen-4.21.0_04-1.1 on GA media",
"tracking": {
"current_release_date": "2026-01-29T00:00:00Z",
"generator": {
"date": "2026-01-29T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10118-1",
"initial_release_date": "2026-01-29T00:00:00Z",
"revision_history": [
{
"date": "2026-01-29T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.21.0_04-1.1.aarch64",
"product": {
"name": "xen-4.21.0_04-1.1.aarch64",
"product_id": "xen-4.21.0_04-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.21.0_04-1.1.aarch64",
"product": {
"name": "xen-devel-4.21.0_04-1.1.aarch64",
"product_id": "xen-devel-4.21.0_04-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.21.0_04-1.1.aarch64",
"product": {
"name": "xen-doc-html-4.21.0_04-1.1.aarch64",
"product_id": "xen-doc-html-4.21.0_04-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.21.0_04-1.1.aarch64",
"product": {
"name": "xen-libs-4.21.0_04-1.1.aarch64",
"product_id": "xen-libs-4.21.0_04-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.21.0_04-1.1.aarch64",
"product": {
"name": "xen-tools-4.21.0_04-1.1.aarch64",
"product_id": "xen-tools-4.21.0_04-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.21.0_04-1.1.aarch64",
"product": {
"name": "xen-tools-domU-4.21.0_04-1.1.aarch64",
"product_id": "xen-tools-domU-4.21.0_04-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.aarch64",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.aarch64",
"product_id": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.21.0_04-1.1.ppc64le",
"product": {
"name": "xen-4.21.0_04-1.1.ppc64le",
"product_id": "xen-4.21.0_04-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-devel-4.21.0_04-1.1.ppc64le",
"product": {
"name": "xen-devel-4.21.0_04-1.1.ppc64le",
"product_id": "xen-devel-4.21.0_04-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.21.0_04-1.1.ppc64le",
"product": {
"name": "xen-doc-html-4.21.0_04-1.1.ppc64le",
"product_id": "xen-doc-html-4.21.0_04-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-libs-4.21.0_04-1.1.ppc64le",
"product": {
"name": "xen-libs-4.21.0_04-1.1.ppc64le",
"product_id": "xen-libs-4.21.0_04-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-tools-4.21.0_04-1.1.ppc64le",
"product": {
"name": "xen-tools-4.21.0_04-1.1.ppc64le",
"product_id": "xen-tools-4.21.0_04-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.21.0_04-1.1.ppc64le",
"product": {
"name": "xen-tools-domU-4.21.0_04-1.1.ppc64le",
"product_id": "xen-tools-domU-4.21.0_04-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.ppc64le",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.ppc64le",
"product_id": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.21.0_04-1.1.s390x",
"product": {
"name": "xen-4.21.0_04-1.1.s390x",
"product_id": "xen-4.21.0_04-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xen-devel-4.21.0_04-1.1.s390x",
"product": {
"name": "xen-devel-4.21.0_04-1.1.s390x",
"product_id": "xen-devel-4.21.0_04-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.21.0_04-1.1.s390x",
"product": {
"name": "xen-doc-html-4.21.0_04-1.1.s390x",
"product_id": "xen-doc-html-4.21.0_04-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xen-libs-4.21.0_04-1.1.s390x",
"product": {
"name": "xen-libs-4.21.0_04-1.1.s390x",
"product_id": "xen-libs-4.21.0_04-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xen-tools-4.21.0_04-1.1.s390x",
"product": {
"name": "xen-tools-4.21.0_04-1.1.s390x",
"product_id": "xen-tools-4.21.0_04-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.21.0_04-1.1.s390x",
"product": {
"name": "xen-tools-domU-4.21.0_04-1.1.s390x",
"product_id": "xen-tools-domU-4.21.0_04-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.s390x",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.s390x",
"product_id": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.21.0_04-1.1.x86_64",
"product": {
"name": "xen-4.21.0_04-1.1.x86_64",
"product_id": "xen-4.21.0_04-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.21.0_04-1.1.x86_64",
"product": {
"name": "xen-devel-4.21.0_04-1.1.x86_64",
"product_id": "xen-devel-4.21.0_04-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.21.0_04-1.1.x86_64",
"product": {
"name": "xen-doc-html-4.21.0_04-1.1.x86_64",
"product_id": "xen-doc-html-4.21.0_04-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.21.0_04-1.1.x86_64",
"product": {
"name": "xen-libs-4.21.0_04-1.1.x86_64",
"product_id": "xen-libs-4.21.0_04-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.21.0_04-1.1.x86_64",
"product": {
"name": "xen-tools-4.21.0_04-1.1.x86_64",
"product_id": "xen-tools-4.21.0_04-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.21.0_04-1.1.x86_64",
"product": {
"name": "xen-tools-domU-4.21.0_04-1.1.x86_64",
"product_id": "xen-tools-domU-4.21.0_04-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.x86_64",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.x86_64",
"product_id": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.21.0_04-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-4.21.0_04-1.1.aarch64"
},
"product_reference": "xen-4.21.0_04-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.21.0_04-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-4.21.0_04-1.1.ppc64le"
},
"product_reference": "xen-4.21.0_04-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.21.0_04-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-4.21.0_04-1.1.s390x"
},
"product_reference": "xen-4.21.0_04-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.21.0_04-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-4.21.0_04-1.1.x86_64"
},
"product_reference": "xen-4.21.0_04-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.21.0_04-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.aarch64"
},
"product_reference": "xen-devel-4.21.0_04-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.21.0_04-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.ppc64le"
},
"product_reference": "xen-devel-4.21.0_04-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.21.0_04-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.s390x"
},
"product_reference": "xen-devel-4.21.0_04-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.21.0_04-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.x86_64"
},
"product_reference": "xen-devel-4.21.0_04-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.21.0_04-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.aarch64"
},
"product_reference": "xen-doc-html-4.21.0_04-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.21.0_04-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.ppc64le"
},
"product_reference": "xen-doc-html-4.21.0_04-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.21.0_04-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.s390x"
},
"product_reference": "xen-doc-html-4.21.0_04-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.21.0_04-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.x86_64"
},
"product_reference": "xen-doc-html-4.21.0_04-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.21.0_04-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.aarch64"
},
"product_reference": "xen-libs-4.21.0_04-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.21.0_04-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.ppc64le"
},
"product_reference": "xen-libs-4.21.0_04-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.21.0_04-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.s390x"
},
"product_reference": "xen-libs-4.21.0_04-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.21.0_04-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.x86_64"
},
"product_reference": "xen-libs-4.21.0_04-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.21.0_04-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.aarch64"
},
"product_reference": "xen-tools-4.21.0_04-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.21.0_04-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.ppc64le"
},
"product_reference": "xen-tools-4.21.0_04-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.21.0_04-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.s390x"
},
"product_reference": "xen-tools-4.21.0_04-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.21.0_04-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.x86_64"
},
"product_reference": "xen-tools-4.21.0_04-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.21.0_04-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.aarch64"
},
"product_reference": "xen-tools-domU-4.21.0_04-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.21.0_04-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.ppc64le"
},
"product_reference": "xen-tools-domU-4.21.0_04-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.21.0_04-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.s390x"
},
"product_reference": "xen-tools-domU-4.21.0_04-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.21.0_04-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.x86_64"
},
"product_reference": "xen-tools-domU-4.21.0_04-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.aarch64"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.ppc64le"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.s390x"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.x86_64"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.21.0_04-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-58150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58150"
}
],
"notes": [
{
"category": "general",
"text": "Shadow mode tracing code uses a set of per-CPU variables to avoid\ncumbersome parameter passing. Some of these variables are written to\nwith guest controlled data, of guest controllable size. That size can\nbe larger than the variable, and bounding of the writes was missing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58150",
"url": "https://www.suse.com/security/cve/CVE-2025-58150"
},
{
"category": "external",
"summary": "SUSE Bug 1256745 for CVE-2025-58150",
"url": "https://bugzilla.suse.com/1256745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-29T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-58150"
},
{
"cve": "CVE-2026-23553",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23553"
}
],
"notes": [
{
"category": "general",
"text": "In the context switch logic Xen attempts to skip an IBPB in the case of\na vCPU returning to a CPU on which it was the previous vCPU to run.\nWhile safe for Xen\u0027s isolation between vCPUs, this prevents the guest\nkernel correctly isolating between tasks. Consider:\n\n 1) vCPU runs on CPU A, running task 1.\n 2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB.\n 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB.\n 4) vCPU moves back to CPU A. Xen skips IBPB again.\n\nNow, task 2 is running on CPU A with task 1\u0027s training still in the BTB.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23553",
"url": "https://www.suse.com/security/cve/CVE-2026-23553"
},
{
"category": "external",
"summary": "SUSE Bug 1256747 for CVE-2026-23553",
"url": "https://bugzilla.suse.com/1256747"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.21.0_04-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.21.0_04-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-29T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-23553"
}
]
}
CERTFR-2026-AVI-0091
Vulnerability from certfr_avis - Published: 2026-01-27 - Updated: 2026-01-27
De multiples vulnérabilités ont été découvertes dans Xen. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| XEN | Xen | Xen versions xen-unstable sans les correctifs de sécurité xsa477.patch et xsa479.patch | ||
| XEN | Xen | Xen versions 4.18.x sans les correctifs de sécurité xsa477-4.18.patch et xsa479.patch | ||
| XEN | Xen | Xen versions 4.19.x sans le correctif de securité xsa477.patch | ||
| XEN | Xen | Xen version varstored master sans le correctif de sécurité xsa478.patch |
References
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Xen versions xen-unstable sans les correctifs de s\u00e9curit\u00e9 xsa477.patch et xsa479.patch",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
},
{
"description": "Xen versions 4.18.x sans les correctifs de s\u00e9curit\u00e9 xsa477-4.18.patch et xsa479.patch",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
},
{
"description": "Xen versions 4.19.x sans le correctif de securit\u00e9 xsa477.patch",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
},
{
"description": "Xen version varstored master sans le correctif de s\u00e9curit\u00e9 xsa478.patch",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-23553",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23553"
},
{
"name": "CVE-2025-58151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58151"
},
{
"name": "CVE-2025-58150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58150"
}
],
"initial_release_date": "2026-01-27T00:00:00",
"last_revision_date": "2026-01-27T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0091",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-01-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Xen. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Xen",
"vendor_advisories": [
{
"published_at": "2026-01-27",
"title": "Bulletin de s\u00e9curit\u00e9 Xen xsa/advisory-477",
"url": "https://xenbits.xen.org/xsa/advisory-477.html"
},
{
"published_at": "2026-01-27",
"title": "Bulletin de s\u00e9curit\u00e9 Xen xsa/advisory-478",
"url": "https://xenbits.xen.org/xsa/advisory-478.html"
},
{
"published_at": "2026-01-27",
"title": "Bulletin de s\u00e9curit\u00e9 Xen xsa/advisory-479",
"url": "https://xenbits.xen.org/xsa/advisory-479.html"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…