VYPR
High severity7.8NVD Advisory· Published Sep 16, 2025· Updated May 12, 2026

CVE-2025-39823

CVE-2025-39823

Description

In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: use array_index_nospec with indices that come from guest

min and dest_id are guest-controlled indices. Using array_index_nospec() after the bounds checks clamps these values to mitigate speculative execution side-channels.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

KVM x86 fails to use array_index_nospec for guest-controlled indices, enabling speculative side-channel attacks that may leak host kernel memory.

Vulnerability

Details

The Linux kernel's KVM subsystem for x86 contains a vulnerability where guest-controlled indices (min and dest_id) used in interrupt delivery are not protected against speculative execution side-channels. The fix adds array_index_nospec() after bounds checks to clamp these values, mitigating potential information disclosure via Spectre-type attacks [1].

Exploitation

An attacker with the ability to run code inside a guest VM can supply crafted values for these indices. While bounds checks are performed, speculative execution may bypass them, allowing an attacker to infer sensitive host kernel memory contents through timing or cache side-channels. No additional privileges are required beyond guest access.

Impact

Successful exploitation could lead to the disclosure of host kernel memory, potentially exposing cryptographic keys, passwords, or other sensitive data. The CVSS score of 7.8 (High) reflects the significant confidentiality impact.

Mitigation

The fix has been applied in the Linux kernel stable tree via commits [2][3][4]. Users should update to the latest kernel version. The Siemens advisory [1] lists this CVE among affected products, indicating that embedded systems using the kernel may also require patching.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

11

News mentions

1