CVE-2026-23554 Affecting xen-tools package, versions <4.20.2_08-150700.3.28.1


Severity

Recommended
0.0
high
0
10

Based on SUSE Linux Enterprise Server security rating.

Threat Intelligence

EPSS
0.01% (3rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-SLES157-XENTOOLS-15870801
  • published1 Apr 2026
  • disclosed26 Mar 2026

Introduced: 26 Mar 2026

CVE-2026-23554  (opens in a new tab)

How to fix?

Upgrade SLES:15.7 xen-tools to version 4.20.2_08-150700.3.28.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream xen-tools package and not the xen-tools package as distributed by SLES. See How to fix? for SLES:15.7 relevant fixed versions and status.

The Intel EPT paging code uses an optimization to defer flushing of any cached EPT state until the p2m lock is dropped, so that multiple modifications done under the same locked region only issue a single flush.

Freeing of paging structures however is not deferred until the flushing is done, and can result in freed pages transiently being present in cached state. Such stale entries can point to memory ranges not owned by the guest, thus allowing access to unintended memory regions.

CVSS Base Scores

version 3.1