Description
In the Linux kernel, the following vulnerability has been resolved: riscv: Sanitize syscall table indexing under speculation The syscall number is a user-controlled value used to index into the syscall table. Use array_index_nospec() to clamp this value after the bounds check to prevent speculative out-of-bounds access and subsequent data leakage via cache side channels.
References (4)
Scores
CVSS v3
7.0
EPSS
0.0002
EPSS Percentile
4.7%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-129
Status
published
Products (14)
linux/Kernel
6.13.0 - 6.18.10linux
linux/Kernel
6.4.0 - 6.12.70linux
Linux/Linux
< 6.4
Linux/Linux
6.12.70 - 6.12.*
Linux/Linux
6.18.10 - 6.18.*
Linux/Linux
6.19
Linux/Linux
6.4
Linux/Linux
6.6.130 - 6.6.*
Linux/Linux
f0bddf50586da81360627a772be0e355b62f071e - 25fd7ee7bf58ac3ec7be3c9f82ceff153451946c
Linux/Linux
f0bddf50586da81360627a772be0e355b62f071e - 33743ec6679aa364ee19d1afbaa50593e9e6e443
... and 4 more
Published
Feb 14, 2026
Tracked Since
Feb 18, 2026