CVE-2025-71203
Severity
7.0HIGH
EPSS
0.0%
top 96.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 14
Description
In the Linux kernel, the following vulnerability has been resolved:
riscv: Sanitize syscall table indexing under speculation
The syscall number is a user-controlled value used to index into the
syscall table. Use array_index_nospec() to clamp this value after the
bounds check to prevent speculative out-of-bounds access and subsequent
data leakage via cache side channels.
CVSS vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9
Affected Packages3 packages
▶CVEListV5linux/linuxf0bddf50586da81360627a772be0e355b62f071e — 33743ec6679aa364ee19d1afbaa50593e9e6e443+4
Patches
🔴Vulnerability Details
3OSV▶
CVE-2025-71203: In the Linux kernel, the following vulnerability has been resolved: riscv: Sanitize syscall table indexing under speculation The syscall number is a u↗2026-02-14
GHSA▶
GHSA-xph2-5pq4-m7jp: In the Linux kernel, the following vulnerability has been resolved:
riscv: Sanitize syscall table indexing under speculation
The syscall number is a↗2026-02-14