CVE-2025-40065

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-40065
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-40065.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-40065
Downstream
Published
2025-10-28T11:48:35Z
Modified
2025-10-28T20:08:10.778499Z
Summary
RISC-V: KVM: Write hgatp register with valid mode bits
Details

In the Linux kernel, the following vulnerability has been resolved:

RISC-V: KVM: Write hgatp register with valid mode bits

According to the RISC-V Privileged Architecture Spec, when MODE=Bare is selected,software must write zero to the remaining fields of hgatp.

We have detected the valid mode supported by the HW before, So using a valid mode to detect how many vmid bits are supported.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
fd7bb4a251dfc1da3496bf59a4793937c13e8c1f
Fixed
d00b61cd37f4c183ce0edbc9f8ccf6d5430ea357
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
fd7bb4a251dfc1da3496bf59a4793937c13e8c1f
Fixed
2b351e3d04be9e1533f26c3464f1e44a5beace30

Affected versions

v5.*

v5.15
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8

v6.*

v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.10
v6.10-rc1
v6.10-rc2
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.11
v6.11-rc1
v6.11-rc2
v6.11-rc3
v6.11-rc4
v6.11-rc5
v6.11-rc6
v6.11-rc7
v6.12
v6.12-rc1
v6.12-rc2
v6.12-rc3
v6.12-rc4
v6.12-rc5
v6.12-rc6
v6.12-rc7
v6.13
v6.13-rc1
v6.13-rc2
v6.13-rc3
v6.13-rc4
v6.13-rc5
v6.13-rc6
v6.13-rc7
v6.14
v6.14-rc1
v6.14-rc2
v6.14-rc3
v6.14-rc4
v6.14-rc5
v6.14-rc6
v6.14-rc7
v6.15
v6.15-rc1
v6.15-rc2
v6.15-rc3
v6.15-rc4
v6.15-rc5
v6.15-rc6
v6.15-rc7
v6.16
v6.16-rc1
v6.16-rc2
v6.16-rc3
v6.16-rc4
v6.16-rc5
v6.16-rc6
v6.16-rc7
v6.17
v6.17-rc1
v6.17-rc2
v6.17-rc3
v6.17-rc4
v6.17-rc5
v6.17-rc6
v6.17-rc7
v6.17.1
v6.17.2
v6.2
v6.2-rc1
v6.2-rc2
v6.2-rc3
v6.2-rc4
v6.2-rc5
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.3
v6.3-rc1
v6.3-rc2
v6.3-rc3
v6.3-rc4
v6.3-rc5
v6.3-rc6
v6.3-rc7
v6.4
v6.4-rc1
v6.4-rc2
v6.4-rc3
v6.4-rc4
v6.4-rc5
v6.4-rc6
v6.4-rc7
v6.5
v6.5-rc1
v6.5-rc2
v6.5-rc3
v6.5-rc4
v6.5-rc5
v6.5-rc6
v6.5-rc7
v6.6
v6.6-rc1
v6.6-rc2
v6.6-rc3
v6.6-rc4
v6.6-rc5
v6.6-rc6
v6.6-rc7
v6.7
v6.7-rc1
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.8
v6.8-rc1
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.9
v6.9-rc1
v6.9-rc2
v6.9-rc3
v6.9-rc4
v6.9-rc5
v6.9-rc6
v6.9-rc7

Database specific

vanir_signatures

[
    {
        "id": "CVE-2025-40065-08e4bc30",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2b351e3d04be9e1533f26c3464f1e44a5beace30",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "file": "arch/riscv/kvm/vmid.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "243071784373728893547724292080401137715",
                "171695944463630887686087566632869066200",
                "124986319343225704371822865136873409990",
                "92652289191922572875702333028510226491",
                "36067299168283784053741751115436072889",
                "159775589630410139753387814389787547479",
                "257317366934873502016165612450458594864",
                "224198234103558933013484663686893809180"
            ]
        },
        "signature_type": "Line"
    },
    {
        "id": "CVE-2025-40065-b674eb79",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d00b61cd37f4c183ce0edbc9f8ccf6d5430ea357",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "function": "kvm_riscv_gstage_vmid_detect",
            "file": "arch/riscv/kvm/vmid.c"
        },
        "digest": {
            "function_hash": "88660808286457977521297660770126343955",
            "length": 364.0
        },
        "signature_type": "Function"
    },
    {
        "id": "CVE-2025-40065-ecb346db",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d00b61cd37f4c183ce0edbc9f8ccf6d5430ea357",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "file": "arch/riscv/kvm/vmid.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "243071784373728893547724292080401137715",
                "171695944463630887686087566632869066200",
                "124986319343225704371822865136873409990",
                "92652289191922572875702333028510226491",
                "36067299168283784053741751115436072889",
                "159775589630410139753387814389787547479",
                "257317366934873502016165612450458594864",
                "224198234103558933013484663686893809180"
            ]
        },
        "signature_type": "Line"
    },
    {
        "id": "CVE-2025-40065-eea7766f",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2b351e3d04be9e1533f26c3464f1e44a5beace30",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "function": "kvm_riscv_gstage_vmid_detect",
            "file": "arch/riscv/kvm/vmid.c"
        },
        "digest": {
            "function_hash": "88660808286457977521297660770126343955",
            "length": 364.0
        },
        "signature_type": "Function"
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.17.3