Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-58149 (GCVE-0-2025-58149)
Vulnerability from cvelistv5 – Published: 2025-10-31 11:50 – Updated: 2025-11-04 21:13- CWE-672 - Operation on a Resource after Expiration or Release
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-58149",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-11-03T14:24:29.854834Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-672",
"description": "CWE-672 Operation on a Resource after Expiration or Release",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-03T14:24:43.755Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-04T21:13:31.524Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://xenbits.xen.org/xsa/advisory-476.html"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/10/24/1"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Xen",
"vendor": "Xen",
"versions": [
{
"status": "unknown",
"version": "consult Xen advisory XSA-476"
}
]
}
],
"configurations": [
{
"lang": "en",
"value": "Xen versions 4.0 and newer are vulnerable.\n\nOnly PV guests with PCI passthrough devices can leverage the vulnerability.\n\nOnly domains whose PCI devices are managed by the libxl library are affected.\nThis includes the xl toolstack and xapi, which uses the xl toolstack when\ndealing with PCI devices.\n\nHVM guests are also affected, but accessing the leaked memory requires an\nadditional compromised component on the system."
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "This issue was discovered by Jiqian Chen of AMD and diagnosed as a\nsecurity issue by Roger Pau Monn\u00e9 of XenServer."
}
],
"datePublic": "2025-10-24T12:13:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "When passing through PCI devices, the detach logic in libxl won\u0027t remove\naccess permissions to any 64bit memory BARs the device might have. As a\nresult a domain can still have access any 64bit memory BAR when such\ndevice is no longer assigned to the domain.\n\nFor PV domains the permission leak allows the domain itself to map the memory\nin the page-tables. For HVM it would require a compromised device model or\nstubdomain to map the leaked memory into the HVM domain p2m."
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "A buggy or malicious PV guest can access memory of PCI devices no longer\nassigned to it."
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-31T11:50:39.536Z",
"orgId": "23aa2041-22e1-471f-9209-9b7396fa234f",
"shortName": "XEN"
},
"references": [
{
"url": "https://xenbits.xenproject.org/xsa/advisory-476.html"
}
],
"title": "Incorrect removal of permissions on PCI device unplug",
"workarounds": [
{
"lang": "en",
"value": "Not doing hot unplug of PCI devices will avoid the vulnerability.\n\nPassing through PCI devices to HVM domains only will also limit the impact, as\nan attacker would require another compromised component to exploit it."
}
]
}
},
"cveMetadata": {
"assignerOrgId": "23aa2041-22e1-471f-9209-9b7396fa234f",
"assignerShortName": "XEN",
"cveId": "CVE-2025-58149",
"datePublished": "2025-10-31T11:50:39.536Z",
"dateReserved": "2025-08-26T06:48:41.443Z",
"dateUpdated": "2025-11-04T21:13:31.524Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-58149\",\"sourceIdentifier\":\"security@xen.org\",\"published\":\"2025-10-31T12:15:35.143\",\"lastModified\":\"2025-11-04T22:16:33.073\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"When passing through PCI devices, the detach logic in libxl won\u0027t remove\\naccess permissions to any 64bit memory BARs the device might have. As a\\nresult a domain can still have access any 64bit memory BAR when such\\ndevice is no longer assigned to the domain.\\n\\nFor PV domains the permission leak allows the domain itself to map the memory\\nin the page-tables. For HVM it would require a compromised device model or\\nstubdomain to map the leaked memory into the HVM domain p2m.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-672\"}]}],\"references\":[{\"url\":\"https://xenbits.xenproject.org/xsa/advisory-476.html\",\"source\":\"security@xen.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/10/24/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://xenbits.xen.org/xsa/advisory-476.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://xenbits.xen.org/xsa/advisory-476.html\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/10/24/1\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-04T21:13:31.524Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-58149\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-11-03T14:24:29.854834Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-672\", \"description\": \"CWE-672 Operation on a Resource after Expiration or Release\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-10-31T17:47:44.176Z\"}}], \"cna\": {\"title\": \"Incorrect removal of permissions on PCI device unplug\", \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"This issue was discovered by Jiqian Chen of AMD and diagnosed as a\\nsecurity issue by Roger Pau Monn\\u00e9 of XenServer.\"}], \"impacts\": [{\"descriptions\": [{\"lang\": \"en\", \"value\": \"A buggy or malicious PV guest can access memory of PCI devices no longer\\nassigned to it.\"}]}], \"affected\": [{\"vendor\": \"Xen\", \"product\": \"Xen\", \"versions\": [{\"status\": \"unknown\", \"version\": \"consult Xen advisory XSA-476\"}], \"defaultStatus\": \"unknown\"}], \"datePublic\": \"2025-10-24T12:13:00.000Z\", \"references\": [{\"url\": \"https://xenbits.xenproject.org/xsa/advisory-476.html\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Not doing hot unplug of PCI devices will avoid the vulnerability.\\n\\nPassing through PCI devices to HVM domains only will also limit the impact, as\\nan attacker would require another compromised component to exploit it.\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"When passing through PCI devices, the detach logic in libxl won\u0027t remove\\naccess permissions to any 64bit memory BARs the device might have. As a\\nresult a domain can still have access any 64bit memory BAR when such\\ndevice is no longer assigned to the domain.\\n\\nFor PV domains the permission leak allows the domain itself to map the memory\\nin the page-tables. For HVM it would require a compromised device model or\\nstubdomain to map the leaked memory into the HVM domain p2m.\"}], \"configurations\": [{\"lang\": \"en\", \"value\": \"Xen versions 4.0 and newer are vulnerable.\\n\\nOnly PV guests with PCI passthrough devices can leverage the vulnerability.\\n\\nOnly domains whose PCI devices are managed by the libxl library are affected.\\nThis includes the xl toolstack and xapi, which uses the xl toolstack when\\ndealing with PCI devices.\\n\\nHVM guests are also affected, but accessing the leaked memory requires an\\nadditional compromised component on the system.\"}], \"providerMetadata\": {\"orgId\": \"23aa2041-22e1-471f-9209-9b7396fa234f\", \"shortName\": \"XEN\", \"dateUpdated\": \"2025-10-31T11:50:39.536Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-58149\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-04T21:13:31.524Z\", \"dateReserved\": \"2025-08-26T06:48:41.443Z\", \"assignerOrgId\": \"23aa2041-22e1-471f-9209-9b7396fa234f\", \"datePublished\": \"2025-10-31T11:50:39.536Z\", \"assignerShortName\": \"XEN\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
GHSA-38QG-7H9Q-7H29
Vulnerability from github – Published: 2025-10-31 12:30 – Updated: 2025-11-05 00:31When passing through PCI devices, the detach logic in libxl won't remove access permissions to any 64bit memory BARs the device might have. As a result a domain can still have access any 64bit memory BAR when such device is no longer assigned to the domain.
For PV domains the permission leak allows the domain itself to map the memory in the page-tables. For HVM it would require a compromised device model or stubdomain to map the leaked memory into the HVM domain p2m.
{
"affected": [],
"aliases": [
"CVE-2025-58149"
],
"database_specific": {
"cwe_ids": [
"CWE-284",
"CWE-672"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-10-31T12:15:35Z",
"severity": "HIGH"
},
"details": "When passing through PCI devices, the detach logic in libxl won\u0027t remove\naccess permissions to any 64bit memory BARs the device might have. As a\nresult a domain can still have access any 64bit memory BAR when such\ndevice is no longer assigned to the domain.\n\nFor PV domains the permission leak allows the domain itself to map the memory\nin the page-tables. For HVM it would require a compromised device model or\nstubdomain to map the leaked memory into the HVM domain p2m.",
"id": "GHSA-38qg-7h9q-7h29",
"modified": "2025-11-05T00:31:32Z",
"published": "2025-10-31T12:30:21Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58149"
},
{
"type": "WEB",
"url": "https://xenbits.xenproject.org/xsa/advisory-476.html"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2025/10/24/1"
},
{
"type": "WEB",
"url": "http://xenbits.xen.org/xsa/advisory-476.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
SUSE-SU-2026:0012-1
Vulnerability from csaf_suse - Published: 2026-01-05 10:31 - Updated: 2026-01-05 10:31Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\nSecurity issues fixed: \n\n- CVE-2025-27466: NULL pointer dereference in the Viridian interface when updating the reference TSC area (bsc#1248807).\n- CVE-2025-58142: NULL pointer dereference in the Viridian interface due to assumption that the SIM page is mapped when\n a synthetic timer message has to be delivered (bsc#1248807).\n- CVE-2025-58143: information leak and reference counter underflow in the Viridian interface due to race in the mapping\n of the reference TSC page (bsc#1248807).\n- CVE-2025-58147: incorrect input sanitisation in Viridian hypercalls using the HV_VP_SET Sparse format can lead to\n out-of-bounds write through `vpmask_set()` (bsc#1251271).\n- CVE-2025-58148: incorrect input sanitisation in Viridian hypercalls using any input format can lead to out-of-bounds\n read through `send_ipi()` (bsc#1251271).\n- CVE-2025-58149: incorrect removal of permissions on PCI device unplug allows PV guests to access memory of devices no\n longer assigned to them (bsc#1252692).\n\nOther issues fixed:\n\n- Several upstream bug fixes (bsc#1027519).\n- Failure to restart xenstored (bsc#1254180).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-12,SUSE-SLE-Module-Basesystem-15-SP6-2026-12,SUSE-SLE-Module-Server-Applications-15-SP6-2026-12,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-12,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-12,openSUSE-SLE-15.6-2026-12",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0012-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0012-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260012-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0012-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023676.html"
},
{
"category": "self",
"summary": "SUSE Bug 1027519",
"url": "https://bugzilla.suse.com/1027519"
},
{
"category": "self",
"summary": "SUSE Bug 1248807",
"url": "https://bugzilla.suse.com/1248807"
},
{
"category": "self",
"summary": "SUSE Bug 1251271",
"url": "https://bugzilla.suse.com/1251271"
},
{
"category": "self",
"summary": "SUSE Bug 1252692",
"url": "https://bugzilla.suse.com/1252692"
},
{
"category": "self",
"summary": "SUSE Bug 1254180",
"url": "https://bugzilla.suse.com/1254180"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-27466 page",
"url": "https://www.suse.com/security/cve/CVE-2025-27466/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58142 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58143 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58143/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58147 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58148 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58148/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58149/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2026-01-05T10:31:27Z",
"generator": {
"date": "2026-01-05T10:31:27Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0012-1",
"initial_release_date": "2026-01-05T10:31:27Z",
"revision_history": [
{
"date": "2026-01-05T10:31:27Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.18.5_08-150600.3.34.2.aarch64",
"product": {
"name": "xen-4.18.5_08-150600.3.34.2.aarch64",
"product_id": "xen-4.18.5_08-150600.3.34.2.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.18.5_08-150600.3.34.2.aarch64",
"product": {
"name": "xen-devel-4.18.5_08-150600.3.34.2.aarch64",
"product_id": "xen-devel-4.18.5_08-150600.3.34.2.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.18.5_08-150600.3.34.2.aarch64",
"product": {
"name": "xen-doc-html-4.18.5_08-150600.3.34.2.aarch64",
"product_id": "xen-doc-html-4.18.5_08-150600.3.34.2.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.18.5_08-150600.3.34.2.aarch64",
"product": {
"name": "xen-libs-4.18.5_08-150600.3.34.2.aarch64",
"product_id": "xen-libs-4.18.5_08-150600.3.34.2.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.18.5_08-150600.3.34.2.aarch64",
"product": {
"name": "xen-tools-4.18.5_08-150600.3.34.2.aarch64",
"product_id": "xen-tools-4.18.5_08-150600.3.34.2.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.18.5_08-150600.3.34.2.aarch64",
"product": {
"name": "xen-tools-domU-4.18.5_08-150600.3.34.2.aarch64",
"product_id": "xen-tools-domU-4.18.5_08-150600.3.34.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-libs-64bit-4.18.5_08-150600.3.34.2.aarch64_ilp32",
"product": {
"name": "xen-libs-64bit-4.18.5_08-150600.3.34.2.aarch64_ilp32",
"product_id": "xen-libs-64bit-4.18.5_08-150600.3.34.2.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.18.5_08-150600.3.34.2.i586",
"product": {
"name": "xen-devel-4.18.5_08-150600.3.34.2.i586",
"product_id": "xen-devel-4.18.5_08-150600.3.34.2.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.18.5_08-150600.3.34.2.i586",
"product": {
"name": "xen-libs-4.18.5_08-150600.3.34.2.i586",
"product_id": "xen-libs-4.18.5_08-150600.3.34.2.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.18.5_08-150600.3.34.2.i586",
"product": {
"name": "xen-tools-domU-4.18.5_08-150600.3.34.2.i586",
"product_id": "xen-tools-domU-4.18.5_08-150600.3.34.2.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"product_id": "xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.18.5_08-150600.3.34.2.x86_64",
"product": {
"name": "xen-4.18.5_08-150600.3.34.2.x86_64",
"product_id": "xen-4.18.5_08-150600.3.34.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"product": {
"name": "xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"product_id": "xen-devel-4.18.5_08-150600.3.34.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.18.5_08-150600.3.34.2.x86_64",
"product": {
"name": "xen-doc-html-4.18.5_08-150600.3.34.2.x86_64",
"product_id": "xen-doc-html-4.18.5_08-150600.3.34.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"product": {
"name": "xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"product_id": "xen-libs-4.18.5_08-150600.3.34.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.18.5_08-150600.3.34.2.x86_64",
"product": {
"name": "xen-libs-32bit-4.18.5_08-150600.3.34.2.x86_64",
"product_id": "xen-libs-32bit-4.18.5_08-150600.3.34.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"product": {
"name": "xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"product_id": "xen-tools-4.18.5_08-150600.3.34.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"product": {
"name": "xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"product_id": "xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.18.5_08-150600.3.34.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64"
},
"product_reference": "xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64"
},
"product_reference": "xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.18.5_08-150600.3.34.2.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64"
},
"product_reference": "xen-4.18.5_08-150600.3.34.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.18.5_08-150600.3.34.2.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64"
},
"product_reference": "xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.18.5_08-150600.3.34.2.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64"
},
"product_reference": "xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.18.5_08-150600.3.34.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:xen-4.18.5_08-150600.3.34.2.x86_64"
},
"product_reference": "xen-4.18.5_08-150600.3.34.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.18.5_08-150600.3.34.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:xen-devel-4.18.5_08-150600.3.34.2.x86_64"
},
"product_reference": "xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.18.5_08-150600.3.34.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:xen-libs-4.18.5_08-150600.3.34.2.x86_64"
},
"product_reference": "xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.18.5_08-150600.3.34.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-4.18.5_08-150600.3.34.2.x86_64"
},
"product_reference": "xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64"
},
"product_reference": "xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.18.5_08-150600.3.34.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64"
},
"product_reference": "xen-4.18.5_08-150600.3.34.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.18.5_08-150600.3.34.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64"
},
"product_reference": "xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.18.5_08-150600.3.34.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64"
},
"product_reference": "xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.18.5_08-150600.3.34.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64"
},
"product_reference": "xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64"
},
"product_reference": "xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.18.5_08-150600.3.34.2.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.aarch64"
},
"product_reference": "xen-4.18.5_08-150600.3.34.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.18.5_08-150600.3.34.2.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.x86_64"
},
"product_reference": "xen-4.18.5_08-150600.3.34.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.18.5_08-150600.3.34.2.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.aarch64"
},
"product_reference": "xen-devel-4.18.5_08-150600.3.34.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.18.5_08-150600.3.34.2.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.x86_64"
},
"product_reference": "xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.18.5_08-150600.3.34.2.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.aarch64"
},
"product_reference": "xen-doc-html-4.18.5_08-150600.3.34.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.18.5_08-150600.3.34.2.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.x86_64"
},
"product_reference": "xen-doc-html-4.18.5_08-150600.3.34.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.18.5_08-150600.3.34.2.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.aarch64"
},
"product_reference": "xen-libs-4.18.5_08-150600.3.34.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.18.5_08-150600.3.34.2.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.x86_64"
},
"product_reference": "xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.18.5_08-150600.3.34.2.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-libs-32bit-4.18.5_08-150600.3.34.2.x86_64"
},
"product_reference": "xen-libs-32bit-4.18.5_08-150600.3.34.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.18.5_08-150600.3.34.2.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.aarch64"
},
"product_reference": "xen-tools-4.18.5_08-150600.3.34.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.18.5_08-150600.3.34.2.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.x86_64"
},
"product_reference": "xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.18.5_08-150600.3.34.2.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.aarch64"
},
"product_reference": "xen-tools-domU-4.18.5_08-150600.3.34.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64"
},
"product_reference": "xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-27466",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-27466"
}
],
"notes": [
{
"category": "general",
"text": "[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nThere are multiple issues related to the handling and accessing of guest\nmemory pages in the viridian code:\n\n 1. A NULL pointer dereference in the updating of the reference TSC area.\n This is CVE-2025-27466.\n\n 2. A NULL pointer dereference by assuming the SIM page is mapped when\n a synthetic timer message has to be delivered. This is\n CVE-2025-58142.\n\n 3. A race in the mapping of the reference TSC page, where a guest can\n get Xen to free a page while still present in the guest physical to\n machine (p2m) page tables. This is CVE-2025-58143.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-27466",
"url": "https://www.suse.com/security/cve/CVE-2025-27466"
},
{
"category": "external",
"summary": "SUSE Bug 1248807 for CVE-2025-27466",
"url": "https://bugzilla.suse.com/1248807"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-05T10:31:27Z",
"details": "important"
}
],
"title": "CVE-2025-27466"
},
{
"cve": "CVE-2025-58142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58142"
}
],
"notes": [
{
"category": "general",
"text": "[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nThere are multiple issues related to the handling and accessing of guest\nmemory pages in the viridian code:\n\n 1. A NULL pointer dereference in the updating of the reference TSC area.\n This is CVE-2025-27466.\n\n 2. A NULL pointer dereference by assuming the SIM page is mapped when\n a synthetic timer message has to be delivered. This is\n CVE-2025-58142.\n\n 3. A race in the mapping of the reference TSC page, where a guest can\n get Xen to free a page while still present in the guest physical to\n machine (p2m) page tables. This is CVE-2025-58143.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58142",
"url": "https://www.suse.com/security/cve/CVE-2025-58142"
},
{
"category": "external",
"summary": "SUSE Bug 1248807 for CVE-2025-58142",
"url": "https://bugzilla.suse.com/1248807"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-05T10:31:27Z",
"details": "important"
}
],
"title": "CVE-2025-58142"
},
{
"cve": "CVE-2025-58143",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58143"
}
],
"notes": [
{
"category": "general",
"text": "[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nThere are multiple issues related to the handling and accessing of guest\nmemory pages in the viridian code:\n\n 1. A NULL pointer dereference in the updating of the reference TSC area.\n This is CVE-2025-27466.\n\n 2. A NULL pointer dereference by assuming the SIM page is mapped when\n a synthetic timer message has to be delivered. This is\n CVE-2025-58142.\n\n 3. A race in the mapping of the reference TSC page, where a guest can\n get Xen to free a page while still present in the guest physical to\n machine (p2m) page tables. This is CVE-2025-58143.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58143",
"url": "https://www.suse.com/security/cve/CVE-2025-58143"
},
{
"category": "external",
"summary": "SUSE Bug 1248807 for CVE-2025-58143",
"url": "https://bugzilla.suse.com/1248807"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-05T10:31:27Z",
"details": "important"
}
],
"title": "CVE-2025-58143"
},
{
"cve": "CVE-2025-58147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58147"
}
],
"notes": [
{
"category": "general",
"text": "[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nSome Viridian hypercalls can specify a mask of vCPU IDs as an input, in\none of three formats. Xen has boundary checking bugs with all three\nformats, which can cause out-of-bounds reads and writes while processing\nthe inputs.\n\n * CVE-2025-58147. Hypercalls using the HV_VP_SET Sparse format can\n cause vpmask_set() to write out of bounds when converting the bitmap\n to Xen\u0027s format.\n\n * CVE-2025-58148. Hypercalls using any input format can cause\n send_ipi() to read d-\u003evcpu[] out-of-bounds, and operate on a wild\n vCPU pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58147",
"url": "https://www.suse.com/security/cve/CVE-2025-58147"
},
{
"category": "external",
"summary": "SUSE Bug 1251271 for CVE-2025-58147",
"url": "https://bugzilla.suse.com/1251271"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-05T10:31:27Z",
"details": "moderate"
}
],
"title": "CVE-2025-58147"
},
{
"cve": "CVE-2025-58148",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58148"
}
],
"notes": [
{
"category": "general",
"text": "[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nSome Viridian hypercalls can specify a mask of vCPU IDs as an input, in\none of three formats. Xen has boundary checking bugs with all three\nformats, which can cause out-of-bounds reads and writes while processing\nthe inputs.\n\n * CVE-2025-58147. Hypercalls using the HV_VP_SET Sparse format can\n cause vpmask_set() to write out of bounds when converting the bitmap\n to Xen\u0027s format.\n\n * CVE-2025-58148. Hypercalls using any input format can cause\n send_ipi() to read d-\u003evcpu[] out-of-bounds, and operate on a wild\n vCPU pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58148",
"url": "https://www.suse.com/security/cve/CVE-2025-58148"
},
{
"category": "external",
"summary": "SUSE Bug 1251271 for CVE-2025-58148",
"url": "https://bugzilla.suse.com/1251271"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-05T10:31:27Z",
"details": "moderate"
}
],
"title": "CVE-2025-58148"
},
{
"cve": "CVE-2025-58149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58149"
}
],
"notes": [
{
"category": "general",
"text": "When passing through PCI devices, the detach logic in libxl won\u0027t remove\naccess permissions to any 64bit memory BARs the device might have. As a\nresult a domain can still have access any 64bit memory BAR when such\ndevice is no longer assigned to the domain.\n\nFor PV domains the permission leak allows the domain itself to map the memory\nin the page-tables. For HVM it would require a compromised device model or\nstubdomain to map the leaked memory into the HVM domain p2m.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58149",
"url": "https://www.suse.com/security/cve/CVE-2025-58149"
},
{
"category": "external",
"summary": "SUSE Bug 1252692 for CVE-2025-58149",
"url": "https://bugzilla.suse.com/1252692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-devel-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-doc-html-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-32bit-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-libs-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.aarch64",
"openSUSE Leap 15.6:xen-tools-domU-4.18.5_08-150600.3.34.2.x86_64",
"openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-05T10:31:27Z",
"details": "moderate"
}
],
"title": "CVE-2025-58149"
}
]
}
SUSE-SU-2025:4419-1
Vulnerability from csaf_suse - Published: 2025-12-16 18:57 - Updated: 2025-12-16 18:57Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\nUpdate to Xen 4.20.2 (jsc#PED-8907).\n \nSecurity issues fixed:\n \n- CVE-2025-58149: incorrect removal of permissions on PCI device unplug allows PV guests to access memory of devices no\n longer assigned to it (XSA-476, bsc#1252692).\n\nOther issues fixed:\n \n- Failure to restart xenstored (bsc#1254180). \n \n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4419,SUSE-SLE-Module-Basesystem-15-SP7-2025-4419,SUSE-SLE-Module-Server-Applications-15-SP7-2025-4419",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4419-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4419-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254419-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4419-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023565.html"
},
{
"category": "self",
"summary": "SUSE Bug 1252692",
"url": "https://bugzilla.suse.com/1252692"
},
{
"category": "self",
"summary": "SUSE Bug 1254180",
"url": "https://bugzilla.suse.com/1254180"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58149/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2025-12-16T18:57:18Z",
"generator": {
"date": "2025-12-16T18:57:18Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4419-1",
"initial_release_date": "2025-12-16T18:57:18Z",
"revision_history": [
{
"date": "2025-12-16T18:57:18Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.20.2_02-150700.3.19.1.aarch64",
"product": {
"name": "xen-4.20.2_02-150700.3.19.1.aarch64",
"product_id": "xen-4.20.2_02-150700.3.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.20.2_02-150700.3.19.1.aarch64",
"product": {
"name": "xen-devel-4.20.2_02-150700.3.19.1.aarch64",
"product_id": "xen-devel-4.20.2_02-150700.3.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.20.2_02-150700.3.19.1.aarch64",
"product": {
"name": "xen-doc-html-4.20.2_02-150700.3.19.1.aarch64",
"product_id": "xen-doc-html-4.20.2_02-150700.3.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.20.2_02-150700.3.19.1.aarch64",
"product": {
"name": "xen-libs-4.20.2_02-150700.3.19.1.aarch64",
"product_id": "xen-libs-4.20.2_02-150700.3.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.20.2_02-150700.3.19.1.aarch64",
"product": {
"name": "xen-tools-4.20.2_02-150700.3.19.1.aarch64",
"product_id": "xen-tools-4.20.2_02-150700.3.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.20.2_02-150700.3.19.1.aarch64",
"product": {
"name": "xen-tools-domU-4.20.2_02-150700.3.19.1.aarch64",
"product_id": "xen-tools-domU-4.20.2_02-150700.3.19.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-libs-64bit-4.20.2_02-150700.3.19.1.aarch64_ilp32",
"product": {
"name": "xen-libs-64bit-4.20.2_02-150700.3.19.1.aarch64_ilp32",
"product_id": "xen-libs-64bit-4.20.2_02-150700.3.19.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.20.2_02-150700.3.19.1.i586",
"product": {
"name": "xen-devel-4.20.2_02-150700.3.19.1.i586",
"product_id": "xen-devel-4.20.2_02-150700.3.19.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.20.2_02-150700.3.19.1.i586",
"product": {
"name": "xen-libs-4.20.2_02-150700.3.19.1.i586",
"product_id": "xen-libs-4.20.2_02-150700.3.19.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.20.2_02-150700.3.19.1.i586",
"product": {
"name": "xen-tools-domU-4.20.2_02-150700.3.19.1.i586",
"product_id": "xen-tools-domU-4.20.2_02-150700.3.19.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.20.2_02-150700.3.19.1.noarch",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.20.2_02-150700.3.19.1.noarch",
"product_id": "xen-tools-xendomains-wait-disk-4.20.2_02-150700.3.19.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.20.2_02-150700.3.19.1.x86_64",
"product": {
"name": "xen-4.20.2_02-150700.3.19.1.x86_64",
"product_id": "xen-4.20.2_02-150700.3.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.20.2_02-150700.3.19.1.x86_64",
"product": {
"name": "xen-devel-4.20.2_02-150700.3.19.1.x86_64",
"product_id": "xen-devel-4.20.2_02-150700.3.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.20.2_02-150700.3.19.1.x86_64",
"product": {
"name": "xen-doc-html-4.20.2_02-150700.3.19.1.x86_64",
"product_id": "xen-doc-html-4.20.2_02-150700.3.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.20.2_02-150700.3.19.1.x86_64",
"product": {
"name": "xen-libs-4.20.2_02-150700.3.19.1.x86_64",
"product_id": "xen-libs-4.20.2_02-150700.3.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.20.2_02-150700.3.19.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.20.2_02-150700.3.19.1.x86_64",
"product_id": "xen-libs-32bit-4.20.2_02-150700.3.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.20.2_02-150700.3.19.1.x86_64",
"product": {
"name": "xen-tools-4.20.2_02-150700.3.19.1.x86_64",
"product_id": "xen-tools-4.20.2_02-150700.3.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.20.2_02-150700.3.19.1.x86_64",
"product": {
"name": "xen-tools-domU-4.20.2_02-150700.3.19.1.x86_64",
"product_id": "xen-tools-domU-4.20.2_02-150700.3.19.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.20.2_02-150700.3.19.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-libs-4.20.2_02-150700.3.19.1.x86_64"
},
"product_reference": "xen-libs-4.20.2_02-150700.3.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.20.2_02-150700.3.19.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-tools-domU-4.20.2_02-150700.3.19.1.x86_64"
},
"product_reference": "xen-tools-domU-4.20.2_02-150700.3.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.20.2_02-150700.3.19.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-4.20.2_02-150700.3.19.1.x86_64"
},
"product_reference": "xen-4.20.2_02-150700.3.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.20.2_02-150700.3.19.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-devel-4.20.2_02-150700.3.19.1.x86_64"
},
"product_reference": "xen-devel-4.20.2_02-150700.3.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.20.2_02-150700.3.19.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-4.20.2_02-150700.3.19.1.x86_64"
},
"product_reference": "xen-tools-4.20.2_02-150700.3.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.20.2_02-150700.3.19.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-xendomains-wait-disk-4.20.2_02-150700.3.19.1.noarch"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.20.2_02-150700.3.19.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-58149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58149"
}
],
"notes": [
{
"category": "general",
"text": "When passing through PCI devices, the detach logic in libxl won\u0027t remove\naccess permissions to any 64bit memory BARs the device might have. As a\nresult a domain can still have access any 64bit memory BAR when such\ndevice is no longer assigned to the domain.\n\nFor PV domains the permission leak allows the domain itself to map the memory\nin the page-tables. For HVM it would require a compromised device model or\nstubdomain to map the leaked memory into the HVM domain p2m.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-libs-4.20.2_02-150700.3.19.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-tools-domU-4.20.2_02-150700.3.19.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-4.20.2_02-150700.3.19.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-devel-4.20.2_02-150700.3.19.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-4.20.2_02-150700.3.19.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-xendomains-wait-disk-4.20.2_02-150700.3.19.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58149",
"url": "https://www.suse.com/security/cve/CVE-2025-58149"
},
{
"category": "external",
"summary": "SUSE Bug 1252692 for CVE-2025-58149",
"url": "https://bugzilla.suse.com/1252692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-libs-4.20.2_02-150700.3.19.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-tools-domU-4.20.2_02-150700.3.19.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-4.20.2_02-150700.3.19.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-devel-4.20.2_02-150700.3.19.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-4.20.2_02-150700.3.19.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-xendomains-wait-disk-4.20.2_02-150700.3.19.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-libs-4.20.2_02-150700.3.19.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xen-tools-domU-4.20.2_02-150700.3.19.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-4.20.2_02-150700.3.19.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-devel-4.20.2_02-150700.3.19.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-4.20.2_02-150700.3.19.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:xen-tools-xendomains-wait-disk-4.20.2_02-150700.3.19.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-16T18:57:18Z",
"details": "moderate"
}
],
"title": "CVE-2025-58149"
}
]
}
SUSE-SU-2025:4490-1
Vulnerability from csaf_suse - Published: 2025-12-19 11:17 - Updated: 2025-12-19 11:17Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\nUpdate to Xen 4.17.6.\n\nSecurity issues fixed:\n\n- CVE-2025-58149: incorrect removal of permissions on PCI device unplug allows PV guests to access memory of devices no\n longer assigned to them (bsc#1252692).\n\nOther issues fixed:\n\n- Several upstream bug fixes (bsc#1027519).\n- Failure to restart xenstored (bsc#1254180).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4490,SUSE-SLE-Micro-5.5-2025-4490",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4490-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4490-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254490-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4490-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023631.html"
},
{
"category": "self",
"summary": "SUSE Bug 1027519",
"url": "https://bugzilla.suse.com/1027519"
},
{
"category": "self",
"summary": "SUSE Bug 1252692",
"url": "https://bugzilla.suse.com/1252692"
},
{
"category": "self",
"summary": "SUSE Bug 1254180",
"url": "https://bugzilla.suse.com/1254180"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58149/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2025-12-19T11:17:12Z",
"generator": {
"date": "2025-12-19T11:17:12Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4490-1",
"initial_release_date": "2025-12-19T11:17:12Z",
"revision_history": [
{
"date": "2025-12-19T11:17:12Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.17.6_02-150500.3.56.1.aarch64",
"product": {
"name": "xen-4.17.6_02-150500.3.56.1.aarch64",
"product_id": "xen-4.17.6_02-150500.3.56.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.17.6_02-150500.3.56.1.aarch64",
"product": {
"name": "xen-devel-4.17.6_02-150500.3.56.1.aarch64",
"product_id": "xen-devel-4.17.6_02-150500.3.56.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.17.6_02-150500.3.56.1.aarch64",
"product": {
"name": "xen-doc-html-4.17.6_02-150500.3.56.1.aarch64",
"product_id": "xen-doc-html-4.17.6_02-150500.3.56.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.17.6_02-150500.3.56.1.aarch64",
"product": {
"name": "xen-libs-4.17.6_02-150500.3.56.1.aarch64",
"product_id": "xen-libs-4.17.6_02-150500.3.56.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.17.6_02-150500.3.56.1.aarch64",
"product": {
"name": "xen-tools-4.17.6_02-150500.3.56.1.aarch64",
"product_id": "xen-tools-4.17.6_02-150500.3.56.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.17.6_02-150500.3.56.1.aarch64",
"product": {
"name": "xen-tools-domU-4.17.6_02-150500.3.56.1.aarch64",
"product_id": "xen-tools-domU-4.17.6_02-150500.3.56.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-libs-64bit-4.17.6_02-150500.3.56.1.aarch64_ilp32",
"product": {
"name": "xen-libs-64bit-4.17.6_02-150500.3.56.1.aarch64_ilp32",
"product_id": "xen-libs-64bit-4.17.6_02-150500.3.56.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.17.6_02-150500.3.56.1.i586",
"product": {
"name": "xen-devel-4.17.6_02-150500.3.56.1.i586",
"product_id": "xen-devel-4.17.6_02-150500.3.56.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.17.6_02-150500.3.56.1.i586",
"product": {
"name": "xen-libs-4.17.6_02-150500.3.56.1.i586",
"product_id": "xen-libs-4.17.6_02-150500.3.56.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.17.6_02-150500.3.56.1.i586",
"product": {
"name": "xen-tools-domU-4.17.6_02-150500.3.56.1.i586",
"product_id": "xen-tools-domU-4.17.6_02-150500.3.56.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.17.6_02-150500.3.56.1.noarch",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.17.6_02-150500.3.56.1.noarch",
"product_id": "xen-tools-xendomains-wait-disk-4.17.6_02-150500.3.56.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.17.6_02-150500.3.56.1.x86_64",
"product": {
"name": "xen-4.17.6_02-150500.3.56.1.x86_64",
"product_id": "xen-4.17.6_02-150500.3.56.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.17.6_02-150500.3.56.1.x86_64",
"product": {
"name": "xen-devel-4.17.6_02-150500.3.56.1.x86_64",
"product_id": "xen-devel-4.17.6_02-150500.3.56.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.17.6_02-150500.3.56.1.x86_64",
"product": {
"name": "xen-doc-html-4.17.6_02-150500.3.56.1.x86_64",
"product_id": "xen-doc-html-4.17.6_02-150500.3.56.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.17.6_02-150500.3.56.1.x86_64",
"product": {
"name": "xen-libs-4.17.6_02-150500.3.56.1.x86_64",
"product_id": "xen-libs-4.17.6_02-150500.3.56.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.17.6_02-150500.3.56.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.17.6_02-150500.3.56.1.x86_64",
"product_id": "xen-libs-32bit-4.17.6_02-150500.3.56.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.17.6_02-150500.3.56.1.x86_64",
"product": {
"name": "xen-tools-4.17.6_02-150500.3.56.1.x86_64",
"product_id": "xen-tools-4.17.6_02-150500.3.56.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.17.6_02-150500.3.56.1.x86_64",
"product": {
"name": "xen-tools-domU-4.17.6_02-150500.3.56.1.x86_64",
"product_id": "xen-tools-domU-4.17.6_02-150500.3.56.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.17.6_02-150500.3.56.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.6_02-150500.3.56.1.x86_64"
},
"product_reference": "xen-libs-4.17.6_02-150500.3.56.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-58149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58149"
}
],
"notes": [
{
"category": "general",
"text": "When passing through PCI devices, the detach logic in libxl won\u0027t remove\naccess permissions to any 64bit memory BARs the device might have. As a\nresult a domain can still have access any 64bit memory BAR when such\ndevice is no longer assigned to the domain.\n\nFor PV domains the permission leak allows the domain itself to map the memory\nin the page-tables. For HVM it would require a compromised device model or\nstubdomain to map the leaked memory into the HVM domain p2m.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.6_02-150500.3.56.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58149",
"url": "https://www.suse.com/security/cve/CVE-2025-58149"
},
{
"category": "external",
"summary": "SUSE Bug 1252692 for CVE-2025-58149",
"url": "https://bugzilla.suse.com/1252692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.6_02-150500.3.56.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.6_02-150500.3.56.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T11:17:12Z",
"details": "moderate"
}
],
"title": "CVE-2025-58149"
}
]
}
FKIE_CVE-2025-58149
Vulnerability from fkie_nvd - Published: 2025-10-31 12:15 - Updated: 2025-11-04 22:16| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "When passing through PCI devices, the detach logic in libxl won\u0027t remove\naccess permissions to any 64bit memory BARs the device might have. As a\nresult a domain can still have access any 64bit memory BAR when such\ndevice is no longer assigned to the domain.\n\nFor PV domains the permission leak allows the domain itself to map the memory\nin the page-tables. For HVM it would require a compromised device model or\nstubdomain to map the leaked memory into the HVM domain p2m."
}
],
"id": "CVE-2025-58149",
"lastModified": "2025-11-04T22:16:33.073",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-10-31T12:15:35.143",
"references": [
{
"source": "security@xen.org",
"url": "https://xenbits.xenproject.org/xsa/advisory-476.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2025/10/24/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://xenbits.xen.org/xsa/advisory-476.html"
}
],
"sourceIdentifier": "security@xen.org",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-672"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
CERTFR-2025-AVI-0927
Vulnerability from certfr_avis - Published: 2025-10-27 - Updated: 2025-10-27
Une vulnérabilité a été découverte dans Xen. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Xen versions xen-unstable sans le correctif de s\u00e9curit\u00e9 xsa476.patch",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
},
{
"description": "Xen versions 4.x ant\u00e9rieures \u00e0 4.17 avec le correctif de s\u00e9curit\u00e9 xsa476-4.17.patch",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
},
{
"description": "Xen versions 4.18.x \u00e0 4.20.x sans le correctif de s\u00e9curit\u00e9 xsa476-4.20.patch",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-58149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58149"
}
],
"initial_release_date": "2025-10-27T00:00:00",
"last_revision_date": "2025-10-27T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0927",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Xen. Elle permet \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Vuln\u00e9rabilit\u00e9 dans Xen",
"vendor_advisories": [
{
"published_at": "2025-10-24",
"title": "Bulletin de s\u00e9curit\u00e9 Xen xsa/advisory-476",
"url": "https://xenbits.xen.org/xsa/advisory-476.html"
}
]
}
OPENSUSE-SU-2025:15719-1
Vulnerability from csaf_opensuse - Published: 2025-11-07 00:00 - Updated: 2025-11-07 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "xen-4.20.1_08-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the xen-4.20.1_08-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15719",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15719-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58149/"
}
],
"title": "xen-4.20.1_08-1.1 on GA media",
"tracking": {
"current_release_date": "2025-11-07T00:00:00Z",
"generator": {
"date": "2025-11-07T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15719-1",
"initial_release_date": "2025-11-07T00:00:00Z",
"revision_history": [
{
"date": "2025-11-07T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.20.1_08-1.1.aarch64",
"product": {
"name": "xen-4.20.1_08-1.1.aarch64",
"product_id": "xen-4.20.1_08-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.20.1_08-1.1.aarch64",
"product": {
"name": "xen-devel-4.20.1_08-1.1.aarch64",
"product_id": "xen-devel-4.20.1_08-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.20.1_08-1.1.aarch64",
"product": {
"name": "xen-doc-html-4.20.1_08-1.1.aarch64",
"product_id": "xen-doc-html-4.20.1_08-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.20.1_08-1.1.aarch64",
"product": {
"name": "xen-libs-4.20.1_08-1.1.aarch64",
"product_id": "xen-libs-4.20.1_08-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.20.1_08-1.1.aarch64",
"product": {
"name": "xen-tools-4.20.1_08-1.1.aarch64",
"product_id": "xen-tools-4.20.1_08-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.20.1_08-1.1.aarch64",
"product": {
"name": "xen-tools-domU-4.20.1_08-1.1.aarch64",
"product_id": "xen-tools-domU-4.20.1_08-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.20.1_08-1.1.aarch64",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.20.1_08-1.1.aarch64",
"product_id": "xen-tools-xendomains-wait-disk-4.20.1_08-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.20.1_08-1.1.ppc64le",
"product": {
"name": "xen-4.20.1_08-1.1.ppc64le",
"product_id": "xen-4.20.1_08-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-devel-4.20.1_08-1.1.ppc64le",
"product": {
"name": "xen-devel-4.20.1_08-1.1.ppc64le",
"product_id": "xen-devel-4.20.1_08-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.20.1_08-1.1.ppc64le",
"product": {
"name": "xen-doc-html-4.20.1_08-1.1.ppc64le",
"product_id": "xen-doc-html-4.20.1_08-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-libs-4.20.1_08-1.1.ppc64le",
"product": {
"name": "xen-libs-4.20.1_08-1.1.ppc64le",
"product_id": "xen-libs-4.20.1_08-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-tools-4.20.1_08-1.1.ppc64le",
"product": {
"name": "xen-tools-4.20.1_08-1.1.ppc64le",
"product_id": "xen-tools-4.20.1_08-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.20.1_08-1.1.ppc64le",
"product": {
"name": "xen-tools-domU-4.20.1_08-1.1.ppc64le",
"product_id": "xen-tools-domU-4.20.1_08-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.20.1_08-1.1.ppc64le",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.20.1_08-1.1.ppc64le",
"product_id": "xen-tools-xendomains-wait-disk-4.20.1_08-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.20.1_08-1.1.s390x",
"product": {
"name": "xen-4.20.1_08-1.1.s390x",
"product_id": "xen-4.20.1_08-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xen-devel-4.20.1_08-1.1.s390x",
"product": {
"name": "xen-devel-4.20.1_08-1.1.s390x",
"product_id": "xen-devel-4.20.1_08-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.20.1_08-1.1.s390x",
"product": {
"name": "xen-doc-html-4.20.1_08-1.1.s390x",
"product_id": "xen-doc-html-4.20.1_08-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xen-libs-4.20.1_08-1.1.s390x",
"product": {
"name": "xen-libs-4.20.1_08-1.1.s390x",
"product_id": "xen-libs-4.20.1_08-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xen-tools-4.20.1_08-1.1.s390x",
"product": {
"name": "xen-tools-4.20.1_08-1.1.s390x",
"product_id": "xen-tools-4.20.1_08-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.20.1_08-1.1.s390x",
"product": {
"name": "xen-tools-domU-4.20.1_08-1.1.s390x",
"product_id": "xen-tools-domU-4.20.1_08-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.20.1_08-1.1.s390x",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.20.1_08-1.1.s390x",
"product_id": "xen-tools-xendomains-wait-disk-4.20.1_08-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.20.1_08-1.1.x86_64",
"product": {
"name": "xen-4.20.1_08-1.1.x86_64",
"product_id": "xen-4.20.1_08-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.20.1_08-1.1.x86_64",
"product": {
"name": "xen-devel-4.20.1_08-1.1.x86_64",
"product_id": "xen-devel-4.20.1_08-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.20.1_08-1.1.x86_64",
"product": {
"name": "xen-doc-html-4.20.1_08-1.1.x86_64",
"product_id": "xen-doc-html-4.20.1_08-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.20.1_08-1.1.x86_64",
"product": {
"name": "xen-libs-4.20.1_08-1.1.x86_64",
"product_id": "xen-libs-4.20.1_08-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.20.1_08-1.1.x86_64",
"product": {
"name": "xen-tools-4.20.1_08-1.1.x86_64",
"product_id": "xen-tools-4.20.1_08-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.20.1_08-1.1.x86_64",
"product": {
"name": "xen-tools-domU-4.20.1_08-1.1.x86_64",
"product_id": "xen-tools-domU-4.20.1_08-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.20.1_08-1.1.x86_64",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.20.1_08-1.1.x86_64",
"product_id": "xen-tools-xendomains-wait-disk-4.20.1_08-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.20.1_08-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-4.20.1_08-1.1.aarch64"
},
"product_reference": "xen-4.20.1_08-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.20.1_08-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-4.20.1_08-1.1.ppc64le"
},
"product_reference": "xen-4.20.1_08-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.20.1_08-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-4.20.1_08-1.1.s390x"
},
"product_reference": "xen-4.20.1_08-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.20.1_08-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-4.20.1_08-1.1.x86_64"
},
"product_reference": "xen-4.20.1_08-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.20.1_08-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-devel-4.20.1_08-1.1.aarch64"
},
"product_reference": "xen-devel-4.20.1_08-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.20.1_08-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-devel-4.20.1_08-1.1.ppc64le"
},
"product_reference": "xen-devel-4.20.1_08-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.20.1_08-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-devel-4.20.1_08-1.1.s390x"
},
"product_reference": "xen-devel-4.20.1_08-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.20.1_08-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-devel-4.20.1_08-1.1.x86_64"
},
"product_reference": "xen-devel-4.20.1_08-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.20.1_08-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-doc-html-4.20.1_08-1.1.aarch64"
},
"product_reference": "xen-doc-html-4.20.1_08-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.20.1_08-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-doc-html-4.20.1_08-1.1.ppc64le"
},
"product_reference": "xen-doc-html-4.20.1_08-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.20.1_08-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-doc-html-4.20.1_08-1.1.s390x"
},
"product_reference": "xen-doc-html-4.20.1_08-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.20.1_08-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-doc-html-4.20.1_08-1.1.x86_64"
},
"product_reference": "xen-doc-html-4.20.1_08-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.20.1_08-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-libs-4.20.1_08-1.1.aarch64"
},
"product_reference": "xen-libs-4.20.1_08-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.20.1_08-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-libs-4.20.1_08-1.1.ppc64le"
},
"product_reference": "xen-libs-4.20.1_08-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.20.1_08-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-libs-4.20.1_08-1.1.s390x"
},
"product_reference": "xen-libs-4.20.1_08-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.20.1_08-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-libs-4.20.1_08-1.1.x86_64"
},
"product_reference": "xen-libs-4.20.1_08-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.20.1_08-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-4.20.1_08-1.1.aarch64"
},
"product_reference": "xen-tools-4.20.1_08-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.20.1_08-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-4.20.1_08-1.1.ppc64le"
},
"product_reference": "xen-tools-4.20.1_08-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.20.1_08-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-4.20.1_08-1.1.s390x"
},
"product_reference": "xen-tools-4.20.1_08-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.20.1_08-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-4.20.1_08-1.1.x86_64"
},
"product_reference": "xen-tools-4.20.1_08-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.20.1_08-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-domU-4.20.1_08-1.1.aarch64"
},
"product_reference": "xen-tools-domU-4.20.1_08-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.20.1_08-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-domU-4.20.1_08-1.1.ppc64le"
},
"product_reference": "xen-tools-domU-4.20.1_08-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.20.1_08-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-domU-4.20.1_08-1.1.s390x"
},
"product_reference": "xen-tools-domU-4.20.1_08-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.20.1_08-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-domU-4.20.1_08-1.1.x86_64"
},
"product_reference": "xen-tools-domU-4.20.1_08-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.20.1_08-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.20.1_08-1.1.aarch64"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.20.1_08-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.20.1_08-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.20.1_08-1.1.ppc64le"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.20.1_08-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.20.1_08-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.20.1_08-1.1.s390x"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.20.1_08-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.20.1_08-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.20.1_08-1.1.x86_64"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.20.1_08-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-58149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58149"
}
],
"notes": [
{
"category": "general",
"text": "When passing through PCI devices, the detach logic in libxl won\u0027t remove\naccess permissions to any 64bit memory BARs the device might have. As a\nresult a domain can still have access any 64bit memory BAR when such\ndevice is no longer assigned to the domain.\n\nFor PV domains the permission leak allows the domain itself to map the memory\nin the page-tables. For HVM it would require a compromised device model or\nstubdomain to map the leaked memory into the HVM domain p2m.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.20.1_08-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.20.1_08-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.20.1_08-1.1.s390x",
"openSUSE Tumbleweed:xen-4.20.1_08-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.20.1_08-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.20.1_08-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.20.1_08-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.20.1_08-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.20.1_08-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.20.1_08-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.20.1_08-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.20.1_08-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.20.1_08-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.20.1_08-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.20.1_08-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.20.1_08-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.20.1_08-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.20.1_08-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.20.1_08-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.20.1_08-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.20.1_08-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.20.1_08-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.20.1_08-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.20.1_08-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.20.1_08-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.20.1_08-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.20.1_08-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.20.1_08-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58149",
"url": "https://www.suse.com/security/cve/CVE-2025-58149"
},
{
"category": "external",
"summary": "SUSE Bug 1252692 for CVE-2025-58149",
"url": "https://bugzilla.suse.com/1252692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.20.1_08-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.20.1_08-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.20.1_08-1.1.s390x",
"openSUSE Tumbleweed:xen-4.20.1_08-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.20.1_08-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.20.1_08-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.20.1_08-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.20.1_08-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.20.1_08-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.20.1_08-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.20.1_08-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.20.1_08-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.20.1_08-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.20.1_08-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.20.1_08-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.20.1_08-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.20.1_08-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.20.1_08-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.20.1_08-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.20.1_08-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.20.1_08-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.20.1_08-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.20.1_08-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.20.1_08-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.20.1_08-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.20.1_08-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.20.1_08-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.20.1_08-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.20.1_08-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.20.1_08-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.20.1_08-1.1.s390x",
"openSUSE Tumbleweed:xen-4.20.1_08-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.20.1_08-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.20.1_08-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.20.1_08-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.20.1_08-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.20.1_08-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.20.1_08-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.20.1_08-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.20.1_08-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.20.1_08-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.20.1_08-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.20.1_08-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.20.1_08-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.20.1_08-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.20.1_08-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.20.1_08-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.20.1_08-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.20.1_08-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.20.1_08-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.20.1_08-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.20.1_08-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.20.1_08-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.20.1_08-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.20.1_08-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.20.1_08-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-58149"
}
]
}
WID-SEC-W-2025-2409
Vulnerability from csaf_certbund - Published: 2025-10-26 23:00 - Updated: 2026-01-05 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Xen ist ein Virtueller-Maschinen-Monitor (VMM), der Hardware (x86, IA-64, PowerPC) f\u00fcr die darauf laufenden Systeme (Domains) paravirtualisiert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Xen ausnutzen, um Sicherheitsvorkehrungen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Hardware Appliance",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2409 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2409.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2409 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2409"
},
{
"category": "external",
"summary": "Xen Security Advisory vom 2025-10-26",
"url": "https://xenbits.xen.org/xsa/advisory-476.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15719-1 vom 2025-11-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IA5TMAIYGVFPCOWUYI6UZDN37HVH6EXG/"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6068 vom 2025-12-03",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00234.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4419-1 vom 2025-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023565.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4490-1 vom 2025-12-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F3OF5NXDVTG3MQHY6W64VCKXNWWGR7JS/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0012-1 vom 2026-01-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023676.html"
}
],
"source_lang": "en-US",
"title": "Xen: Schwachstelle erm\u00f6glicht Umgehen von Sicherheitsvorkehrungen",
"tracking": {
"current_release_date": "2026-01-05T23:00:00.000+00:00",
"generator": {
"date": "2026-01-06T08:36:01.464+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2409",
"initial_release_date": "2025-10-26T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-10-26T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-11-09T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-12-02T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-12-16T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-21T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-05T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "6"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cxsa476-4.17.patch",
"product": {
"name": "Open Source Xen \u003cxsa476-4.17.patch",
"product_id": "T048152"
}
},
{
"category": "product_version",
"name": "xsa476-4.17.patch",
"product": {
"name": "Open Source Xen xsa476-4.17.patch",
"product_id": "T048152-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:xen:xen:xsa476-4.17.patch"
}
}
},
{
"category": "product_version_range",
"name": "\u003cxsa476-4.20.patch",
"product": {
"name": "Open Source Xen \u003cxsa476-4.20.patch",
"product_id": "T048153"
}
},
{
"category": "product_version",
"name": "xsa476-4.20.patch",
"product": {
"name": "Open Source Xen xsa476-4.20.patch",
"product_id": "T048153-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:xen:xen:xsa476-4.20.patch"
}
}
},
{
"category": "product_version_range",
"name": "\u003cxsa476.patch",
"product": {
"name": "Open Source Xen \u003cxsa476.patch",
"product_id": "T048154"
}
},
{
"category": "product_version",
"name": "xsa476.patch",
"product": {
"name": "Open Source Xen xsa476.patch",
"product_id": "T048154-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:xen:xen:xsa476.patch"
}
}
}
],
"category": "product_name",
"name": "Xen"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-58149",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T048153",
"T048152",
"T027843",
"T048154"
]
},
"release_date": "2025-10-26T23:00:00.000+00:00",
"title": "CVE-2025-58149"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.