Description
An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to trigger out-of-bounds heap accesses in the QEMU process via the emulated Xen physdev hypercall interface, leading to a denial of service or potential memory corruption.
Published: 2026-02-18
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service and potential memory corruption
Action: Apply Patch
AI Analysis

Impact

An off‑by‑one error in QEMU’s handling of the Xen physdev hypercall kvm xen physdevop_map_pirq allows a malicious guest VM to trigger an out‑of‑bounds heap access in the QEMU process. This flaw can lead to service interruption or memory corruption, exposing the host system to downtime. The vulnerability is categorized as both an out‑of‑bounds read (CWE‑125) and write (CWE‑787), underscoring its impact on the integrity of the QEMU heap.

Affected Systems

The affected platform is Red Hat Enterprise Linux across releases 6, 7, 8, 9, and 10, as well as Red Hat OpenShift Container Platform 4. All hosts running the default QEMU/KVM packages for these distributions are potentially impacted.

Risk and Exploitability

The CVSS base score of 6.5 denotes a medium severity assessment. EPSS indicates a very low probability of exploitation (< 1 %). The flaw is not listed in the CISA Known Exploited Vulnerabilities catalog, suggesting no publicly known exploits yet. The likely attack vector involves a malicious guest that issues a crafted Xen physdev hypercall; the attacker must have the ability to run a virtual machine on the host, making this a local‑escalation style threat in a multi‑tenant or virtualized environment.

Generated by OpenCVE AI on April 18, 2026 at 17:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the host’s QEMU/KVM packages to the latest Red Hat releases that contain the patch for CVE‑2026‑0665.
  • If a patch is not yet available, configure the host to restrict or disable Xen physdev hypercalls for untrusted guest VMs, limiting the ability of guests to invoke this interface.
  • Consider disabling Xen support in QEMU if it is not required, thereby reducing the attack surface available to guest VMs.

Generated by OpenCVE AI on April 18, 2026 at 17:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Feb 2026 21:00:00 +0000

Type Values Removed Values Added
Title qemu-kvm: Heap off-by-one in KVM Xen PHYSDEVOP_map_pirq Qemu-kvm: heap off-by-one in kvm xen physdevop_map_pirq
First Time appeared Redhat
Redhat enterprise Linux
Redhat openshift
CPEs cpe:/a:redhat:openshift:4
cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
Redhat openshift
References

Tue, 13 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
Description An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to trigger out-of-bounds heap accesses in the QEMU process via the emulated Xen physdev hypercall interface, leading to a denial of service or potential memory corruption.
Title qemu-kvm: Heap off-by-one in KVM Xen PHYSDEVOP_map_pirq
Weaknesses CWE-125
CWE-787
References
Metrics threat_severity

None

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H'}

threat_severity

Moderate


Subscriptions

Redhat Enterprise Linux Openshift
cve-icon MITRE

Status: PUBLISHED

Assigner: fedora

Published:

Updated: 2026-02-18T21:27:14.216Z

Reserved: 2026-01-07T12:09:11.643Z

Link: CVE-2026-0665

cve-icon Vulnrichment

Updated: 2026-02-18T21:27:06.428Z

cve-icon NVD

Status : Deferred

Published: 2026-02-18T21:16:22.633

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-0665

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-01-09T00:00:00Z

Links: CVE-2026-0665 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T18:00:06Z

Weaknesses