In the Linux kernel, the following vulnerability has been resolved:
RISC-V: KVM: fix stack overrun when loading vlenb
The userspace load can put up to 2048 bits into an xlen bit stack buffer. We want only xlen bits, so check the size beforehand.
[
{
"id": "CVE-2025-39815-7c9b0f03",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6d28659b692a0212f360f8bd8a58712b339f9aac",
"digest": {
"threshold": 0.9,
"line_hashes": [
"221746391669732134680163608625899196830",
"87573243582660954218866280051907891248",
"191583444602938268251537590533612556731"
]
},
"signature_version": "v1",
"signature_type": "Line",
"target": {
"file": "arch/riscv/kvm/vcpu_vector.c"
}
},
{
"id": "CVE-2025-39815-8fc1cd63",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6d28659b692a0212f360f8bd8a58712b339f9aac",
"digest": {
"function_hash": "132546180472947406729675958494068304612",
"length": 762.0
},
"signature_version": "v1",
"signature_type": "Function",
"target": {
"file": "arch/riscv/kvm/vcpu_vector.c",
"function": "kvm_riscv_vcpu_set_reg_vector"
}
},
{
"id": "CVE-2025-39815-8fe6dd73",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@799766208f09f95677a9ab111b93872d414fbad7",
"digest": {
"function_hash": "132546180472947406729675958494068304612",
"length": 762.0
},
"signature_version": "v1",
"signature_type": "Function",
"target": {
"file": "arch/riscv/kvm/vcpu_vector.c",
"function": "kvm_riscv_vcpu_set_reg_vector"
}
},
{
"id": "CVE-2025-39815-a5b37399",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c76bf8359188a11f8fd790e5bbd6077894a245cc",
"digest": {
"function_hash": "132546180472947406729675958494068304612",
"length": 762.0
},
"signature_version": "v1",
"signature_type": "Function",
"target": {
"file": "arch/riscv/kvm/vcpu_vector.c",
"function": "kvm_riscv_vcpu_set_reg_vector"
}
},
{
"id": "CVE-2025-39815-d041a0c1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c76bf8359188a11f8fd790e5bbd6077894a245cc",
"digest": {
"threshold": 0.9,
"line_hashes": [
"221746391669732134680163608625899196830",
"87573243582660954218866280051907891248",
"191583444602938268251537590533612556731"
]
},
"signature_version": "v1",
"signature_type": "Line",
"target": {
"file": "arch/riscv/kvm/vcpu_vector.c"
}
},
{
"id": "CVE-2025-39815-eb7c5c1d",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@799766208f09f95677a9ab111b93872d414fbad7",
"digest": {
"threshold": 0.9,
"line_hashes": [
"221746391669732134680163608625899196830",
"87573243582660954218866280051907891248",
"191583444602938268251537590533612556731"
]
},
"signature_version": "v1",
"signature_type": "Line",
"target": {
"file": "arch/riscv/kvm/vcpu_vector.c"
}
}
]