CVE-2025-71203

Source
https://cve.org/CVERecord?id=CVE-2025-71203
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71203.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-71203
Downstream
Published
2026-02-14T16:27:02.513Z
Modified
2026-04-02T13:04:56.819588Z
Summary
riscv: Sanitize syscall table indexing under speculation
Details

In the Linux kernel, the following vulnerability has been resolved:

riscv: Sanitize syscall table indexing under speculation

The syscall number is a user-controlled value used to index into the syscall table. Use arrayindexnospec() to clamp this value after the bounds check to prevent speculative out-of-bounds access and subsequent data leakage via cache side channels.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71203.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f0bddf50586da81360627a772be0e355b62f071e
Fixed
33743ec6679aa364ee19d1afbaa50593e9e6e443
Fixed
c45848936ebdb4fcab92f8c39510db83c16d0239
Fixed
8b44e753795107a22ba31495686e83f4aca48f36
Fixed
25fd7ee7bf58ac3ec7be3c9f82ceff153451946c

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71203.json"