{"uuid": "b3c76594-5630-423e-a8a1-cf436a2d8d28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21818", "type": "seen", "source": "https://t.me/cvedetector/19081", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21818 - Xen Linux XenPVH Guest Register Clobber Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-21818 \nPublished : Feb. 27, 2025, 8:16 p.m. | 1\u00a0hour, 21\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nx86/xen: fix xen_hypercall_hvm() to not clobber %rbx  \n  \nxen_hypercall_hvm(), which is used when running as a Xen PVH guest at  \nmost only once during early boot, is clobbering %rbx. Depending on  \nwhether the caller relies on %rbx to be preserved across the call or  \nnot, this clobbering might result in an early crash of the system.  \n  \nThis can be avoided by using an already saved register instead of %rbx. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-27T23:26:55.000000Z"}