VYPR
Unrated severityNVD Advisory· Published Dec 16, 2025· Updated Apr 15, 2026

CVE-2025-68259

CVE-2025-68259

Description

In the Linux kernel, the following vulnerability has been resolved:

KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced

When re-injecting a soft interrupt from an INT3, INT0, or (select) INTn instruction, discard the exception and retry the instruction if the code stream is changed (e.g. by a different vCPU) between when the CPU executes the instruction and when KVM decodes the instruction to get the next RIP.

As effectively predicted by commit 6ef88d6e36c2 ("KVM: SVM: Re-inject INT3/INTO instead of retrying the instruction"), failure to verify that the correct INTn instruction was decoded can effectively clobber guest state due to decoding the wrong instruction and thus specifying the wrong next RIP.

The bug most often manifests as "Oops: int3" panics on static branch checks in Linux guests. Enabling or disabling a static branch in Linux uses the kernel's "text poke" code patching mechanism. To modify code while other CPUs may be executing that code, Linux (temporarily) replaces the first byte of the original instruction with an int3 (opcode 0xcc), then patches in the new code stream except for the first byte, and finally replaces the int3 with the first byte of the new code stream. If a CPU hits the int3, i.e. executes the code while it's being modified, then the guest kernel must look up the RIP to determine how to handle the #BP, e.g. by emulating the new instruction. If the RIP is incorrect, then this lookup fails and the guest kernel panics.

The bug reproduces almost instantly by hacking the guest kernel to repeatedly check a static branch[1] while running a drgn script[2] on the host to constantly swap out the memory containing the guest's TSS.

[1]: https://gist.github.com/osandov/44d17c51c28c0ac998ea0334edf90b5a [2]: https://gist.github.com/osandov/10e45e45afa29b11e0c7209247afc00b

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

KVM SVM re-injection of INT3/INTO soft interrupts can decode a wrong instruction if the code stream changes between execution and decoding, leading to guest kernel panics.

The vulnerability resides in KVM's SVM (AMD) virtualization code. When re-injecting a soft interrupt from INT3, INTO, or certain INTn instructions, KVM decodes the instruction after the guest has executed it. If a different vCPU modifies the code stream between execution and decoding (e.g., via kernel text patching), KVM can decode an unrelated instruction and compute an incorrect next RIP. This issue was effectively predicted but not fully addressed by commit 6ef88d6e36c2 ("KVM: SVM: Re-inject INT3/INTO instead of retrying the instruction").

The attack surface is a race condition exploitable by a host attacker (or another vCPU) that can modify guest memory while a vCPU is executing. A common trigger occurs during Linux guest static branch patching: the kernel temporarily replaces the first byte of an instruction with an INT3 (0xcc). If a CPU hits the INT3, the #BP handler looks up the RIP to handle it. If the RIP is incorrect due to the race, the lookup fails and the guest kernel panics with an "Oops: int3" error.

An attacker with the ability to control the execution of a second vCPU or to manipulate guest memory (e.g., through a drgn script as shown in the description) can exploit this to cause a denial of service by crashing the guest kernel. The bug reproduces rapidly under specific workloads combining frequent static branch checks with memory modification.

The issue is fixed in the Linux kernel by commits 2e84a018c2895 and 152289a51107 (backported to stable trees) [1][2]. These patches ensure that KVM verifies the decoded instruction matches the original INT3/INTO before re-injection, discarding the exception and retrying if the code has changed. Users should apply the latest kernel updates from their distribution.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.