Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2026:0012-1

Опубликовано: 05 янв. 2026
Источник: suse-cvrf

Описание

Security update for xen

This update for xen fixes the following issues:

Security issues fixed:

  • CVE-2025-27466: NULL pointer dereference in the Viridian interface when updating the reference TSC area (bsc#1248807).
  • CVE-2025-58142: NULL pointer dereference in the Viridian interface due to assumption that the SIM page is mapped when a synthetic timer message has to be delivered (bsc#1248807).
  • CVE-2025-58143: information leak and reference counter underflow in the Viridian interface due to race in the mapping of the reference TSC page (bsc#1248807).
  • CVE-2025-58147: incorrect input sanitisation in Viridian hypercalls using the HV_VP_SET Sparse format can lead to out-of-bounds write through vpmask_set() (bsc#1251271).
  • CVE-2025-58148: incorrect input sanitisation in Viridian hypercalls using any input format can lead to out-of-bounds read through send_ipi() (bsc#1251271).
  • CVE-2025-58149: incorrect removal of permissions on PCI device unplug allows PV guests to access memory of devices no longer assigned to them (bsc#1252692).

Other issues fixed:

  • Several upstream bug fixes (bsc#1027519).
  • Failure to restart xenstored (bsc#1254180).

Список пакетов

SUSE Linux Enterprise Module for Basesystem 15 SP6
xen-libs-4.18.5_08-150600.3.34.2
xen-tools-domU-4.18.5_08-150600.3.34.2
SUSE Linux Enterprise Module for Server Applications 15 SP6
xen-4.18.5_08-150600.3.34.2
xen-devel-4.18.5_08-150600.3.34.2
xen-tools-4.18.5_08-150600.3.34.2
xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2
SUSE Linux Enterprise Server 15 SP6-LTSS
xen-4.18.5_08-150600.3.34.2
xen-devel-4.18.5_08-150600.3.34.2
xen-libs-4.18.5_08-150600.3.34.2
xen-tools-4.18.5_08-150600.3.34.2
xen-tools-domU-4.18.5_08-150600.3.34.2
xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2
SUSE Linux Enterprise Server for SAP Applications 15 SP6
xen-4.18.5_08-150600.3.34.2
xen-devel-4.18.5_08-150600.3.34.2
xen-libs-4.18.5_08-150600.3.34.2
xen-tools-4.18.5_08-150600.3.34.2
xen-tools-domU-4.18.5_08-150600.3.34.2
xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2
openSUSE Leap 15.6
xen-4.18.5_08-150600.3.34.2
xen-devel-4.18.5_08-150600.3.34.2
xen-doc-html-4.18.5_08-150600.3.34.2
xen-libs-4.18.5_08-150600.3.34.2
xen-libs-32bit-4.18.5_08-150600.3.34.2
xen-tools-4.18.5_08-150600.3.34.2
xen-tools-domU-4.18.5_08-150600.3.34.2
xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2

Описание

[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] There are multiple issues related to the handling and accessing of guest memory pages in the viridian code: 1. A NULL pointer dereference in the updating of the reference TSC area. This is CVE-2025-27466. 2. A NULL pointer dereference by assuming the SIM page is mapped when a synthetic timer message has to be delivered. This is CVE-2025-58142. 3. A race in the mapping of the reference TSC page, where a guest can get Xen to free a page while still present in the guest physical to machine (p2m) page tables. This is CVE-2025-58143.


Затронутые продукты
SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.5_08-150600.3.34.2
SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2
SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.5_08-150600.3.34.2
SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2

Ссылки

Описание

[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] There are multiple issues related to the handling and accessing of guest memory pages in the viridian code: 1. A NULL pointer dereference in the updating of the reference TSC area. This is CVE-2025-27466. 2. A NULL pointer dereference by assuming the SIM page is mapped when a synthetic timer message has to be delivered. This is CVE-2025-58142. 3. A race in the mapping of the reference TSC page, where a guest can get Xen to free a page while still present in the guest physical to machine (p2m) page tables. This is CVE-2025-58143.


Затронутые продукты
SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.5_08-150600.3.34.2
SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2
SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.5_08-150600.3.34.2
SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2

Ссылки

Описание

[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] There are multiple issues related to the handling and accessing of guest memory pages in the viridian code: 1. A NULL pointer dereference in the updating of the reference TSC area. This is CVE-2025-27466. 2. A NULL pointer dereference by assuming the SIM page is mapped when a synthetic timer message has to be delivered. This is CVE-2025-58142. 3. A race in the mapping of the reference TSC page, where a guest can get Xen to free a page while still present in the guest physical to machine (p2m) page tables. This is CVE-2025-58143.


Затронутые продукты
SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.5_08-150600.3.34.2
SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2
SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.5_08-150600.3.34.2
SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2

Ссылки

Описание

[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Some Viridian hypercalls can specify a mask of vCPU IDs as an input, in one of three formats. Xen has boundary checking bugs with all three formats, which can cause out-of-bounds reads and writes while processing the inputs. * CVE-2025-58147. Hypercalls using the HV_VP_SET Sparse format can cause vpmask_set() to write out of bounds when converting the bitmap to Xen's format. * CVE-2025-58148. Hypercalls using any input format can cause send_ipi() to read d->vcpu[] out-of-bounds, and operate on a wild vCPU pointer.


Затронутые продукты
SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.5_08-150600.3.34.2
SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2
SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.5_08-150600.3.34.2
SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2

Ссылки

Описание

[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Some Viridian hypercalls can specify a mask of vCPU IDs as an input, in one of three formats. Xen has boundary checking bugs with all three formats, which can cause out-of-bounds reads and writes while processing the inputs. * CVE-2025-58147. Hypercalls using the HV_VP_SET Sparse format can cause vpmask_set() to write out of bounds when converting the bitmap to Xen's format. * CVE-2025-58148. Hypercalls using any input format can cause send_ipi() to read d->vcpu[] out-of-bounds, and operate on a wild vCPU pointer.


Затронутые продукты
SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.5_08-150600.3.34.2
SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2
SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.5_08-150600.3.34.2
SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2

Ссылки

Описание

When passing through PCI devices, the detach logic in libxl won't remove access permissions to any 64bit memory BARs the device might have. As a result a domain can still have access any 64bit memory BAR when such device is no longer assigned to the domain. For PV domains the permission leak allows the domain itself to map the memory in the page-tables. For HVM it would require a compromised device model or stubdomain to map the leaked memory into the HVM domain p2m.


Затронутые продукты
SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.5_08-150600.3.34.2
SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.5_08-150600.3.34.2
SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.5_08-150600.3.34.2
SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.5_08-150600.3.34.2

Ссылки
Уязвимость SUSE-SU-2026:0012-1