<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for xen</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2026:0303-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2026-01-27T16:14:45Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2026-01-27T16:14:45Z</InitialReleaseDate>
    <CurrentReleaseDate>2026-01-27T16:14:45Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for xen</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for xen fixes the following issues:

Security fixes:
  
- CVE-2025-58150: Fixed buffer overrun with shadow paging and 
  tracing (XSA-477) (bsc#1256745)
- CVE-2026-23553: Fixed incomplete IBPB for vCPU isolation 
  (XSA-479) (bsc#1256747)
- CVE-2025-58149: Fixed incorrect removal od permissions on PCI
  device unplug allow PV guests to access memory of devices no 
  longer assigned to it (XSA-476) (bsc#1252692)
- CVE-2025-27466, CVE-2025-58142, CVE-2025-58143: Fixed multiple
  vulnerabilities in the Viridian interface (XSA-472) (bsc#1248807)

Other fixes:

- Fixed virtxend service restart. Caused by a failure to start 
  xenstored (bsc#1254180)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2026-303,SUSE-SUSE-MicroOS-5.2-2026-303</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260303-1/</URL>
      <Description>Link for SUSE-SU-2026:0303-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2026-January/023931.html</URL>
      <Description>E-Mail link for SUSE-SU-2026:0303-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248807</URL>
      <Description>SUSE Bug 1248807</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1252692</URL>
      <Description>SUSE Bug 1252692</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1254180</URL>
      <Description>SUSE Bug 1254180</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1256745</URL>
      <Description>SUSE Bug 1256745</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1256747</URL>
      <Description>SUSE Bug 1256747</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-27466/</URL>
      <Description>SUSE CVE CVE-2025-27466 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-58142/</URL>
      <Description>SUSE CVE CVE-2025-58142 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-58143/</URL>
      <Description>SUSE CVE CVE-2025-58143 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-58149/</URL>
      <Description>SUSE CVE CVE-2025-58149 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-58150/</URL>
      <Description>SUSE CVE CVE-2025-58150 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-23553/</URL>
      <Description>SUSE CVE CVE-2026-23553 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Micro 5.2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Micro 5.2">
        <FullProductName ProductID="SUSE Linux Enterprise Micro 5.2" CPE="cpe:/o:suse:suse-microos:5.2">SUSE Linux Enterprise Micro 5.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="xen-4.14.6_28-150300.3.94.1">
      <FullProductName ProductID="xen-4.14.6_28-150300.3.94.1">xen-4.14.6_28-150300.3.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-devel-4.14.6_28-150300.3.94.1">
      <FullProductName ProductID="xen-devel-4.14.6_28-150300.3.94.1">xen-devel-4.14.6_28-150300.3.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-doc-html-4.14.6_28-150300.3.94.1">
      <FullProductName ProductID="xen-doc-html-4.14.6_28-150300.3.94.1">xen-doc-html-4.14.6_28-150300.3.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-4.14.6_28-150300.3.94.1">
      <FullProductName ProductID="xen-libs-4.14.6_28-150300.3.94.1">xen-libs-4.14.6_28-150300.3.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-32bit-4.14.6_28-150300.3.94.1">
      <FullProductName ProductID="xen-libs-32bit-4.14.6_28-150300.3.94.1">xen-libs-32bit-4.14.6_28-150300.3.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-64bit-4.14.6_28-150300.3.94.1">
      <FullProductName ProductID="xen-libs-64bit-4.14.6_28-150300.3.94.1">xen-libs-64bit-4.14.6_28-150300.3.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-4.14.6_28-150300.3.94.1">
      <FullProductName ProductID="xen-tools-4.14.6_28-150300.3.94.1">xen-tools-4.14.6_28-150300.3.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-domU-4.14.6_28-150300.3.94.1">
      <FullProductName ProductID="xen-tools-domU-4.14.6_28-150300.3.94.1">xen-tools-domU-4.14.6_28-150300.3.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-xendomains-wait-disk-4.14.6_28-150300.3.94.1">
      <FullProductName ProductID="xen-tools-xendomains-wait-disk-4.14.6_28-150300.3.94.1">xen-tools-xendomains-wait-disk-4.14.6_28-150300.3.94.1</FullProductName>
    </Branch>
    <Relationship ProductReference="xen-libs-4.14.6_28-150300.3.94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.2">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1">xen-libs-4.14.6_28-150300.3.94.1 as a component of SUSE Linux Enterprise Micro 5.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">[This CNA information record relates to multiple CVEs; the
text explains which aspects/vulnerabilities correspond to which CVE.]

There are multiple issues related to the handling and accessing of guest
memory pages in the viridian code:

 1. A NULL pointer dereference in the updating of the reference TSC area.
    This is CVE-2025-27466.

 2. A NULL pointer dereference by assuming the SIM page is mapped when
    a synthetic timer message has to be delivered.  This is
    CVE-2025-58142.

 3. A race in the mapping of the reference TSC page, where a guest can
    get Xen to free a page while still present in the guest physical to
    machine (p2m) page tables.  This is CVE-2025-58143.</Note>
    </Notes>
    <CVE>CVE-2025-27466</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260303-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-27466.html</URL>
        <Description>CVE-2025-27466</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248807</URL>
        <Description>SUSE Bug 1248807</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">[This CNA information record relates to multiple CVEs; the
text explains which aspects/vulnerabilities correspond to which CVE.]

There are multiple issues related to the handling and accessing of guest
memory pages in the viridian code:

 1. A NULL pointer dereference in the updating of the reference TSC area.
    This is CVE-2025-27466.

 2. A NULL pointer dereference by assuming the SIM page is mapped when
    a synthetic timer message has to be delivered.  This is
    CVE-2025-58142.

 3. A race in the mapping of the reference TSC page, where a guest can
    get Xen to free a page while still present in the guest physical to
    machine (p2m) page tables.  This is CVE-2025-58143.</Note>
    </Notes>
    <CVE>CVE-2025-58142</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260303-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-58142.html</URL>
        <Description>CVE-2025-58142</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248807</URL>
        <Description>SUSE Bug 1248807</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">[This CNA information record relates to multiple CVEs; the
text explains which aspects/vulnerabilities correspond to which CVE.]

There are multiple issues related to the handling and accessing of guest
memory pages in the viridian code:

 1. A NULL pointer dereference in the updating of the reference TSC area.
    This is CVE-2025-27466.

 2. A NULL pointer dereference by assuming the SIM page is mapped when
    a synthetic timer message has to be delivered.  This is
    CVE-2025-58142.

 3. A race in the mapping of the reference TSC page, where a guest can
    get Xen to free a page while still present in the guest physical to
    machine (p2m) page tables.  This is CVE-2025-58143.</Note>
    </Notes>
    <CVE>CVE-2025-58143</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260303-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-58143.html</URL>
        <Description>CVE-2025-58143</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248807</URL>
        <Description>SUSE Bug 1248807</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When passing through PCI devices, the detach logic in libxl won't remove
access permissions to any 64bit memory BARs the device might have.  As a
result a domain can still have access any 64bit memory BAR when such
device is no longer assigned to the domain.

For PV domains the permission leak allows the domain itself to map the memory
in the page-tables.  For HVM it would require a compromised device model or
stubdomain to map the leaked memory into the HVM domain p2m.</Note>
    </Notes>
    <CVE>CVE-2025-58149</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260303-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-58149.html</URL>
        <Description>CVE-2025-58149</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1252692</URL>
        <Description>SUSE Bug 1252692</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Shadow mode tracing code uses a set of per-CPU variables to avoid
cumbersome parameter passing.  Some of these variables are written to
with guest controlled data, of guest controllable size.  That size can
be larger than the variable, and bounding of the writes was missing.</Note>
    </Notes>
    <CVE>CVE-2025-58150</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260303-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-58150.html</URL>
        <Description>CVE-2025-58150</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1256745</URL>
        <Description>SUSE Bug 1256745</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the context switch logic Xen attempts to skip an IBPB in the case of
a vCPU returning to a CPU on which it was the previous vCPU to run.
While safe for Xen's isolation between vCPUs, this prevents the guest
kernel correctly isolating between tasks.  Consider:

 1) vCPU runs on CPU A, running task 1.
 2) vCPU moves to CPU B, idle gets scheduled on A.  Xen skips IBPB.
 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB.
 4) vCPU moves back to CPU A.  Xen skips IBPB again.

Now, task 2 is running on CPU A with task 1's training still in the BTB.</Note>
    </Notes>
    <CVE>CVE-2026-23553</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_28-150300.3.94.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260303-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-23553.html</URL>
        <Description>CVE-2026-23553</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1256747</URL>
        <Description>SUSE Bug 1256747</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
