Vulnerability Description
Certain instructions need intercepting and emulating by Xen. In some cases Xen emulates the instruction by replaying it, using an executable stub. Some instructions may raise an exception, which is supposed to be handled gracefully. Certain replayed instructions have additional logic to set up and recover the changes to the arithmetic flags. For replayed instructions where the flags recovery logic is used, the metadata for exception handling was incorrect, preventing Xen from handling the the exception gracefully, treating it as fatal instead.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xen | Xen | >= 4.9.0 |
Related Weaknesses (CWE)
References
- https://xenbits.xenproject.org/xsa/advisory-470.htmlPatchVendor Advisory
- http://www.openwall.com/lists/oss-security/2025/07/01/1Mailing ListThird Party Advisory
- http://xenbits.xen.org/xsa/advisory-470.htmlPatchVendor Advisory
FAQ
What is CVE-2025-27465?
CVE-2025-27465 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Certain instructions need intercepting and emulating by Xen. In some cases Xen emulates the instruction by replaying it, using an executable stub. Some instructions may raise an exception, which is ...
How severe is CVE-2025-27465?
CVE-2025-27465 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-27465?
Check the references section above for vendor advisories and patch information. Affected products include: Xen Xen.