CVE-2025-71203

Severity
7.0HIGH
EPSS
0.0%
top 96.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 14

Description

In the Linux kernel, the following vulnerability has been resolved: riscv: Sanitize syscall table indexing under speculation The syscall number is a user-controlled value used to index into the syscall table. Use array_index_nospec() to clamp this value after the bounds check to prevent speculative out-of-bounds access and subsequent data leakage via cache side channels.

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9

Affected Packages3 packages

NVDlinux/linux_kernel6.46.12.70+2
CVEListV5linux/linuxf0bddf50586da81360627a772be0e355b62f071e33743ec6679aa364ee19d1afbaa50593e9e6e443+4
Debianlinux< 6.12.73-1+1

Patches

🔴Vulnerability Details

3
OSV
CVE-2025-71203: In the Linux kernel, the following vulnerability has been resolved: riscv: Sanitize syscall table indexing under speculation The syscall number is a u2026-02-14
GHSA
GHSA-xph2-5pq4-m7jp: In the Linux kernel, the following vulnerability has been resolved: riscv: Sanitize syscall table indexing under speculation The syscall number is a2026-02-14
CVEList
riscv: Sanitize syscall table indexing under speculation2026-02-14

📋Vendor Advisories

2
Red Hat
kernel: riscv: Sanitize syscall table indexing under speculation2026-02-14
Debian
CVE-2025-71203: linux - In the Linux kernel, the following vulnerability has been resolved: riscv: Sani...2025

🕵️Threat Intelligence

1
Wiz
CVE-2025-71203 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2025-71203 (HIGH CVSS 7) | In the Linux kernel | cvebase.io