CVE-2025-40300
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
11/09/2025
Last modified:
17/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
x86/vmscape: Add conditional IBPB mitigation<br />
<br />
VMSCAPE is a vulnerability that exploits insufficient branch predictor<br />
isolation between a guest and a userspace hypervisor (like QEMU). Existing<br />
mitigations already protect kernel/KVM from a malicious guest. Userspace<br />
can additionally be protected by flushing the branch predictors after a<br />
VMexit.<br />
<br />
Since it is the userspace that consumes the poisoned branch predictors,<br />
conditionally issue an IBPB after a VMexit and before returning to<br />
userspace. Workloads that frequently switch between hypervisor and<br />
userspace will incur the most overhead from the new IBPB.<br />
<br />
This new IBPB is not integrated with the existing IBPB sites. For<br />
instance, a task can use the existing speculation control prctl() to<br />
get an IBPB at context switch time. With this implementation, the<br />
IBPB is doubled up: one at context switch and another before running<br />
userspace.<br />
<br />
The intent is to integrate and optimize these cases post-embargo.<br />
<br />
[ dhansen: elaborate on suboptimal IBPB solution ]
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/15006289e5c38b2a830e1fba221977a27598176c
- https://git.kernel.org/stable/c/2f4f2f8f860cb4c3336a7435ebe8dcfded0c9c6e
- https://git.kernel.org/stable/c/2f8f173413f1cbf52660d04df92d0069c4306d25
- https://git.kernel.org/stable/c/34e5667041050711a947e260fc9ebebe08bddee5
- https://git.kernel.org/stable/c/459274c77b37ac63b78c928b4b4e748d1f9d05c8
- https://git.kernel.org/stable/c/510603f504796c3535f67f55fb0b124a303b44c8
- https://git.kernel.org/stable/c/893387c18612bb452336a5881da0d015a7e8f4a2
- https://git.kernel.org/stable/c/9c23a90648e831d611152ac08dbcd1283d405e7f
- https://git.kernel.org/stable/c/ac60717f9a8d21c58617d0b34274babf24135835
- https://git.kernel.org/stable/c/c08192b5d6730a914dee6175bc71092ee6a65f14
- https://git.kernel.org/stable/c/d5490dfa35427a2967e00a4c7a1b95fdbc8ede34
- https://git.kernel.org/stable/c/d7ddc93392e4a7ffcccc86edf6ef3e64c778db52
- https://git.kernel.org/stable/c/f866eef8d1c65504d30923c3f14082ad294d0e6d
- http://www.openwall.com/lists/oss-security/2025/11/14/3
- http://www.openwall.com/lists/oss-security/2025/11/14/4
- http://www.openwall.com/lists/oss-security/2025/11/14/6
- http://www.openwall.com/lists/oss-security/2025/11/17/2
- http://www.openwall.com/lists/oss-security/2025/11/17/3
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



