Metrics
Affected Vendors & Products
Link | Providers |
---|---|
https://xenbits.xenproject.org/xsa/advisory-470.html |
![]() ![]() |
Thu, 17 Jul 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-755 | |
Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 16 Jul 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
Wed, 16 Jul 2025 09:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Certain instructions need intercepting and emulating by Xen. In some cases Xen emulates the instruction by replaying it, using an executable stub. Some instructions may raise an exception, which is supposed to be handled gracefully. Certain replayed instructions have additional logic to set up and recover the changes to the arithmetic flags. For replayed instructions where the flags recovery logic is used, the metadata for exception handling was incorrect, preventing Xen from handling the the exception gracefully, treating it as fatal instead. | |
Title | x86: Incorrect stubs exception handling for flags recovery | |
References |
|

Status: PUBLISHED
Assigner: XEN
Published: 2025-07-16T09:08:39.931Z
Updated: 2025-07-17T15:00:57.741Z
Reserved: 2025-02-26T09:16:54.461Z
Link: CVE-2025-27465

Updated: 2025-07-16T20:46:28.330Z

Status : Awaiting Analysis
Published: 2025-07-16T09:15:23.040
Modified: 2025-07-17T15:15:25.500
Link: CVE-2025-27465

No data.