In the Linux kernel, the following vulnerability has been resolved:
riscv: Sanitize syscall table indexing under speculation
The syscall number is a user-controlled value used to index into the
syscall table. Use array_index_nospec() to clamp this value after the
bounds check to prevent speculative out-of-bounds access and subsequent
data leakage via cache side channels.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-02-14 17:15
Updated : 2026-03-25 11:16
NVD link : CVE-2025-71203
Mitre link : CVE-2025-71203
CVE.ORG link : CVE-2025-71203
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-129
Improper Validation of Array Index
