In the Linux kernel, the following vulnerability has been resolved:
KVM: x86: use arrayindexnospec with indices that come from guest
min and destid are guest-controlled indices. Using arrayindex_nospec() after the bounds checks clamps these values to mitigate speculative execution side-channels.