CVE-2025-27465Improper Handling of Exceptional Conditions in XEN

Severity
4.3MEDIUMNVD
EPSS
0.1%
top 74.40%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 16

Description

Certain instructions need intercepting and emulating by Xen. In some cases Xen emulates the instruction by replaying it, using an executable stub. Some instructions may raise an exception, which is supposed to be handled gracefully. Certain replayed instructions have additional logic to set up and recover the changes to the arithmetic flags. For replayed instructions where the flags recovery logic is used, the metadata for exception handling was incorrect, preventing Xen from handling the the e

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:LExploitability: 2.8 | Impact: 1.4

Affected Packages3 packages

Alpinexen/xen< 4.18.5-r1+4
Debianxen/xen< 4.17.5+72-g01140da4e8-1+2
NVDxen/xen

Patches

🔴Vulnerability Details

4
OSV
CVE-2025-27465: Certain instructions need intercepting and emulating by Xen2025-07-16
CVEList
x86: Incorrect stubs exception handling for flags recovery2025-07-16
GHSA
GHSA-2vp3-crwq-3fg5: Certain instructions need intercepting and emulating by Xen2025-07-16
OSV
CVE-2025-27465: Certain instructions need intercepting and emulating by Xen2025-07-16

📋Vendor Advisories

1
Debian
CVE-2025-27465: xen - Certain instructions need intercepting and emulating by Xen. In some cases Xen ...2025