Description
In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: Fix the descriptor address in __kvm_at_swap_desc()

Using "(u64 __user *)hva + offset" to get the virtual addresses of S1/S2
descriptors looks really wrong, if offset is not zero. What we want to get
for swapping is hva + offset, not hva + offset*8. ;-)

Fix it.
Published: 2026-04-24
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege escalation via KVM memory corruption
Action: Patch Kernel
AI Analysis

Impact

KVM for arm64 contains a bug in the __kvm_at_swap_desc() routine where a descriptor address is calculated incorrectly. The code uses (u64 __user *)hva + offset instead of hva + offset, which can cause memory corruption when offset is non‑zero. This flaw could enable an attacker to corrupt kernel memory or execute arbitrary code within the KVM environment, leading to privilege escalation on the host.

Affected Systems

The flaw affects the Linux kernel on arm64 for all builds 6.19 and the 7.0 release candidates (rc1 through rc7). It is relevant for any Linux distribution that ships these kernel versions and has KVM enabled.

Risk and Exploitability

The CVSS score of 8.8 indicates high severity, while the EPSS score of less than 1% suggests a low current likelihood of exploitation. The vulnerability is not listed in CISA's KEV catalog, implying no known active exploits. Inference: the flaw is in the KVM core and could be triggered by a guest with sufficient privileges or by a local attacker able to manipulate virtual memory offsets. As a result, the risk remains significant for environments running KVM on the affected kernel releases.

Generated by OpenCVE AI on April 28, 2026 at 14:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the kernel to a patched version that includes the __kvm_at_swap_desc() fix, such as Linux 6.19.1 or any 7.x release beyond rc7.
  • If upgrading cannot be performed immediately, disable KVM on affected hosts or restrict guest privileges to prevent access to legacy descriptor swaps.
  • Alternatively, apply the specific kernel patch from commit 0496acc42fb51eee040b5170cec05cec41385540, rebuild, and deploy the updated kernel to the affected systems.

Generated by OpenCVE AI on April 28, 2026 at 14:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:linux:linux_kernel:6.19:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*

Mon, 27 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Sat, 25 Apr 2026 00:15:00 +0000


Fri, 24 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Fix the descriptor address in __kvm_at_swap_desc() Using "(u64 __user *)hva + offset" to get the virtual addresses of S1/S2 descriptors looks really wrong, if offset is not zero. What we want to get for swapping is hva + offset, not hva + offset*8. ;-) Fix it.
Title KVM: arm64: Fix the descriptor address in __kvm_at_swap_desc()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:11:00.473Z

Reserved: 2026-03-09T15:48:24.115Z

Link: CVE-2026-31553

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T15:16:29.633

Modified: 2026-04-27T20:15:03.240

Link: CVE-2026-31553

cve-icon Redhat

Severity :

Publid Date: 2026-04-24T00:00:00Z

Links: CVE-2026-31553 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T14:30:33Z

Weaknesses