๐Ÿ” CVE Alert

CVE-2025-68259

UNKNOWN 0.0

KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced When re-injecting a soft interrupt from an INT3, INT0, or (select) INTn instruction, discard the exception and retry the instruction if the code stream is changed (e.g. by a different vCPU) between when the CPU executes the instruction and when KVM decodes the instruction to get the next RIP. As effectively predicted by commit 6ef88d6e36c2 ("KVM: SVM: Re-inject INT3/INTO instead of retrying the instruction"), failure to verify that the correct INTn instruction was decoded can effectively clobber guest state due to decoding the wrong instruction and thus specifying the wrong next RIP. The bug most often manifests as "Oops: int3" panics on static branch checks in Linux guests. Enabling or disabling a static branch in Linux uses the kernel's "text poke" code patching mechanism. To modify code while other CPUs may be executing that code, Linux (temporarily) replaces the first byte of the original instruction with an int3 (opcode 0xcc), then patches in the new code stream except for the first byte, and finally replaces the int3 with the first byte of the new code stream. If a CPU hits the int3, i.e. executes the code while it's being modified, then the guest kernel must look up the RIP to determine how to handle the #BP, e.g. by emulating the new instruction. If the RIP is incorrect, then this lookup fails and the guest kernel panics. The bug reproduces almost instantly by hacking the guest kernel to repeatedly check a static branch[1] while running a drgn script[2] on the host to constantly swap out the memory containing the guest's TSS. [1]: https://gist.github.com/osandov/44d17c51c28c0ac998ea0334edf90b5a [2]: https://gist.github.com/osandov/10e45e45afa29b11e0c7209247afc00b

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 16, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
6ef88d6e36c2b4b3886ec9967cafabe4424d27d5 < 2e84a018c2895c05abe213eb10db128aa45f6ec6 6ef88d6e36c2b4b3886ec9967cafabe4424d27d5 < 152289a51107ef45bbfe9b4aeeaa584a503042b5 6ef88d6e36c2b4b3886ec9967cafabe4424d27d5 < 87cc1622c88a4888959d64fa1fc9ba1e264aa3d4 6ef88d6e36c2b4b3886ec9967cafabe4424d27d5 < 54bcccc2c7805a00af1d7d2faffd6f424c0133aa 6ef88d6e36c2b4b3886ec9967cafabe4424d27d5 < 53903ac9ca1abffa27327e85075ec496fa55ccf3 6ef88d6e36c2b4b3886ec9967cafabe4424d27d5 < 4da3768e1820cf15cced390242d8789aed34f54d
Linux / Linux
6.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/2e84a018c2895c05abe213eb10db128aa45f6ec6 git.kernel.org: https://git.kernel.org/stable/c/152289a51107ef45bbfe9b4aeeaa584a503042b5 git.kernel.org: https://git.kernel.org/stable/c/87cc1622c88a4888959d64fa1fc9ba1e264aa3d4 git.kernel.org: https://git.kernel.org/stable/c/54bcccc2c7805a00af1d7d2faffd6f424c0133aa git.kernel.org: https://git.kernel.org/stable/c/53903ac9ca1abffa27327e85075ec496fa55ccf3 git.kernel.org: https://git.kernel.org/stable/c/4da3768e1820cf15cced390242d8789aed34f54d