In the Linux kernel, the following vulnerability has been resolved:
KVM: x86: use array_index_nospec with indices that come from guest
min and dest_id are guest-controlled indices. Using array_index_nospec()
after the bounds checks clamps these values to mitigate speculative execution
side-channels.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2025-09-16 13:16
Updated : 2026-01-16 20:38
NVD link : CVE-2025-39823
Mitre link : CVE-2025-39823
CVE.ORG link : CVE-2025-39823
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-129
Improper Validation of Array Index
