SUSE alert SUSE-SU-2025:03172-1 (xen)
From: | SLE-SECURITY-UPDATES <null@suse.de> | |
To: | sle-security-updates@lists.suse.com | |
Subject: | SUSE-SU-2025:03172-1: important: Security update for xen | |
Date: | Thu, 11 Sep 2025 16:30:26 -0000 | |
Message-ID: | <175760822649.29615.7090562474525401678@smelt2.prg2.suse.org> |
# Security update for xen Announcement ID: SUSE-SU-2025:03172-1 Release Date: 2025-09-11T12:54:02Z Rating: important References: * bsc#1027519 * bsc#1248807 Cross-References: * CVE-2025-27466 * CVE-2025-58142 * CVE-2025-58143 CVSS scores: * CVE-2025-27466 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2025-27466 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-58142 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2025-58142 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-58143 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-58143 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP7 * Server Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for xen fixes the following issues: Security issues fixed: * CVE-2025-27466: NULL pointer dereference in the Viridian interface when updating the reference TSC area (bsc#1248807). * CVE-2025-58142: NULL pointer dereference in the Viridian interface due to assumption that the SIM page is mapped when a synthetic timer message has to be delivered (bsc#1248807). * CVE-2025-58143: information leak and reference counter underflow in the Viridian interface due to race in the mapping of the reference TSC page (bsc#1248807). Other issues fixed: * efi: Call FreePages() only if needed (bsc#1027519). * x86/hpet: do local APIC EOI after interrupt processing (bsc#1027519). * x86/hvm/ioreq: Fix condition in hvm_alloc_legacy_ioreq_gfn() (bsc#1027519). * x86/idle: Fix the C6 eoi_errata[] list to include NEHALEM_EX (bsc#1027519). * x86/iommu: setup MMCFG ahead of IOMMU (bsc#1027519). * x86/mce: Adjustments to intel_init_ppin() (bsc#1027519). * x86/mkelf32: pad load segment to 2Mb boundary (bsc#1027519). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-3172=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-3172=1 ## Package List: * Basesystem Module 15-SP7 (x86_64) * xen-tools-domU-debuginfo-4.20.1_04-150700.3.11.1 * xen-libs-4.20.1_04-150700.3.11.1 * xen-tools-domU-4.20.1_04-150700.3.11.1 * xen-debugsource-4.20.1_04-150700.3.11.1 * xen-libs-debuginfo-4.20.1_04-150700.3.11.1 * Server Applications Module 15-SP7 (x86_64) * xen-tools-debuginfo-4.20.1_04-150700.3.11.1 * xen-4.20.1_04-150700.3.11.1 * xen-tools-4.20.1_04-150700.3.11.1 * xen-debugsource-4.20.1_04-150700.3.11.1 * xen-devel-4.20.1_04-150700.3.11.1 * Server Applications Module 15-SP7 (noarch) * xen-tools-xendomains-wait-disk-4.20.1_04-150700.3.11.1 ## References: * https://www.suse.com/security/cve/CVE-2025-27466.html * https://www.suse.com/security/cve/CVE-2025-58142.html * https://www.suse.com/security/cve/CVE-2025-58143.html * https://bugzilla.suse.com/show_bug.cgi?id=1027519 * https://bugzilla.suse.com/show_bug.cgi?id=1248807
Attachment: None (type=text/html)
(HTML attachment elided)