{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T04:35:12.079","vulnerabilities":[{"cve":{"id":"CVE-2025-27465","sourceIdentifier":"security@xen.org","published":"2025-07-16T09:15:23.040","lastModified":"2026-01-13T22:13:34.590","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Certain instructions need intercepting and emulating by Xen.  In some\ncases Xen emulates the instruction by replaying it, using an executable\nstub.  Some instructions may raise an exception, which is supposed to be\nhandled gracefully.  Certain replayed instructions have additional logic\nto set up and recover the changes to the arithmetic flags.\n\nFor replayed instructions where the flags recovery logic is used, the\nmetadata for exception handling was incorrect, preventing Xen from\nhandling the the exception gracefully, treating it as fatal instead."},{"lang":"es","value":"Ciertas instrucciones requieren ser interceptadas y emuladas por Xen. En algunos casos, Xen emula la instrucción repitiéndola mediante un stub ejecutable. Algunas instrucciones pueden generar una excepción, que debería gestionarse correctamente. Algunas instrucciones repetidas tienen lógica adicional para configurar y recuperar los cambios en las banderas aritméticas. En las instrucciones repetidas donde se utiliza la lógica de recuperación de banderas, los metadatos para la gestión de excepciones eran incorrectos, lo que impidió que Xen la gestionara correctamente, tratándola como fatal."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-755"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*","versionStartIncluding":"4.9.0","matchCriteriaId":"6730EA5A-AAE6-4C6F-963C-EBE9E4AA4D48"}]}]}],"references":[{"url":"https://xenbits.xenproject.org/xsa/advisory-470.html","source":"security@xen.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2025/07/01/1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http://xenbits.xen.org/xsa/advisory-470.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}