{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-27465","assignerOrgId":"23aa2041-22e1-471f-9209-9b7396fa234f","state":"PUBLISHED","assignerShortName":"XEN","dateReserved":"2025-02-26T09:16:54.461Z","datePublished":"2025-07-16T09:08:39.931Z","dateUpdated":"2025-11-04T21:09:50.127Z"},"containers":{"cna":{"title":"x86: Incorrect stubs exception handling for flags recovery","datePublic":"2025-07-01T11:56:00.000Z","descriptions":[{"lang":"en","value":"Certain instructions need intercepting and emulating by Xen.  In some\ncases Xen emulates the instruction by replaying it, using an executable\nstub.  Some instructions may raise an exception, which is supposed to be\nhandled gracefully.  Certain replayed instructions have additional logic\nto set up and recover the changes to the arithmetic flags.\n\nFor replayed instructions where the flags recovery logic is used, the\nmetadata for exception handling was incorrect, preventing Xen from\nhandling the the exception gracefully, treating it as fatal instead."}],"impacts":[{"descriptions":[{"lang":"en","value":"An unprivileged guest can cause a hypervisor crash, causing a Denial of\nService (DoS) of the entire host."}]}],"affected":[{"defaultStatus":"unknown","product":"Xen","vendor":"Xen","versions":[{"status":"unknown","version":"consult Xen advisory XSA-470"}]}],"configurations":[{"lang":"en","value":"Xen 4.9 and onwards are vulnerable.  Xen 4.8 and older are not\nvulnerable.\n\nOnly x86 systems are vulnerable.  ARM systems are not vulnerable.\n\nOnly HVM or PVH guests can leverage the vulnerability.  PV guests cannot\nleverage the vulnerability."}],"workarounds":[{"lang":"en","value":"There are no mitigations."}],"credits":[{"lang":"en","type":"finder","value":"This issue was discovered by Andrew Cooper of XenServer."}],"references":[{"url":"https://xenbits.xenproject.org/xsa/advisory-470.html"}],"providerMetadata":{"orgId":"23aa2041-22e1-471f-9209-9b7396fa234f","shortName":"XEN","dateUpdated":"2025-07-16T09:08:39.931Z"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-755","lang":"en","description":"CWE-755 Improper Handling of Exceptional Conditions"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":4.3,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"LOW","privilegesRequired":"LOW","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-07-16T20:46:06.289437Z","id":"CVE-2025-27465","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-07-17T15:00:57.741Z"}},{"title":"CVE Program Container","references":[{"url":"http://xenbits.xen.org/xsa/advisory-470.html"},{"url":"http://www.openwall.com/lists/oss-security/2025/07/01/1"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-04T21:09:50.127Z"}}]}}