{"id":"CVE-2025-71203","summary":"riscv: Sanitize syscall table indexing under speculation","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nriscv: Sanitize syscall table indexing under speculation\n\nThe syscall number is a user-controlled value used to index into the\nsyscall table. Use array_index_nospec() to clamp this value after the\nbounds check to prevent speculative out-of-bounds access and subsequent\ndata leakage via cache side channels.","modified":"2026-04-02T13:04:56.819588Z","published":"2026-02-14T16:27:02.513Z","database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71203.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/25fd7ee7bf58ac3ec7be3c9f82ceff153451946c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/33743ec6679aa364ee19d1afbaa50593e9e6e443"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8b44e753795107a22ba31495686e83f4aca48f36"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c45848936ebdb4fcab92f8c39510db83c16d0239"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71203.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-71203"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"f0bddf50586da81360627a772be0e355b62f071e"},{"fixed":"33743ec6679aa364ee19d1afbaa50593e9e6e443"},{"fixed":"c45848936ebdb4fcab92f8c39510db83c16d0239"},{"fixed":"8b44e753795107a22ba31495686e83f4aca48f36"},{"fixed":"25fd7ee7bf58ac3ec7be3c9f82ceff153451946c"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71203.json"}}],"schema_version":"1.7.5"}