Description
In the Linux kernel, the following vulnerability has been resolved:

LoongArch: KVM: Handle the case that EIOINTC's coremap is empty

EIOINTC's coremap in eiointc_update_sw_coremap() can be empty, currently
we get a cpuid with -1 in this case, but we actually need 0 because it's
similar as the case that cpuid >= 4.

This fix an out-of-bounds access to kvm_arch::phyid_map::phys_map[].
Published: 2026-04-24
Score: 7.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Out-of-Bounds Memory Corruption
Action: Apply Patch
AI Analysis

Impact

The vulnerability arises in the LoongArch KVM implementation when the EIOINTC controller’s coremap is empty, causing eiointc_update_sw_coremap() to retrieve a cpuid of –1 instead of 0. This leads to an out‑of-bounds read into the kvm_arch::phyid_map::phys_map array, potentially corrupting kernel memory and compromising integrity. The flaw is a classic CWE‑125 out‑of‑bounds read that could be leveraged for privilege escalation within the kernel space.

Affected Systems

Affected by CVE‑2026‑31569 are Linux kernel releases 6.13 and all 7.0 release candidates (RC1 through RC7). The issue exists in the Linux:Linux vendor’s kernel for the LoongArch architecture, any system running one of those kernel versions with KVM enabled.

Risk and Exploitability

The CVSS score of 7.3 indicates a high severity for local privilege escalation, while the EPSS score of less than 1% suggests the likelihood of exploitation is low at present, and the vulnerability is not listed in CISA KEV. Exploitation would require the attacker to run code or trigger operations in a LoongArch virtualized environment where KVM interacts with an EIOINTC that has an empty coremap; thus, the attack vector is likely local or requires privileged access to a virtual machine. The risk remains significant for environments that use the affected kernels in production, especially those deploying LoongArch KVM instances.

Generated by OpenCVE AI on April 28, 2026 at 14:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that includes the patch (e.g., 6.13 or 7.0 RC7 or later).
  • Verify that the KVM module for LoongArch is compiled and activated in the updated kernel.
  • If immediate kernel upgrade is not possible, consider disabling or reconfiguring EIOINTC devices in KVM to avoid an empty coremap scenario until a patch is applied.

Generated by OpenCVE AI on April 28, 2026 at 14:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-125
CPEs cpe:2.3:o:linux:linux_kernel:6.13:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*

Mon, 27 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:H'}


Sat, 25 Apr 2026 00:15:00 +0000


Fri, 24 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: LoongArch: KVM: Handle the case that EIOINTC's coremap is empty EIOINTC's coremap in eiointc_update_sw_coremap() can be empty, currently we get a cpuid with -1 in this case, but we actually need 0 because it's similar as the case that cpuid >= 4. This fix an out-of-bounds access to kvm_arch::phyid_map::phys_map[].
Title LoongArch: KVM: Handle the case that EIOINTC's coremap is empty
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:11:19.509Z

Reserved: 2026-03-09T15:48:24.117Z

Link: CVE-2026-31569

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T15:16:31.420

Modified: 2026-04-27T20:33:04.393

Link: CVE-2026-31569

cve-icon Redhat

Severity :

Publid Date: 2026-04-24T00:00:00Z

Links: CVE-2026-31569 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T14:15:34Z

Weaknesses