Description
In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: Eagerly init vgic dist/redist on vgic creation

If vgic_allocate_private_irqs_locked() fails for any odd reason,
we exit kvm_vgic_create() early, leaving dist->rd_regions uninitialised.

kvm_vgic_dist_destroy() then comes along and walks into the weeds
trying to free the RDs. Got to love this stuff.

Solve it by moving all the static initialisation early, and make
sure that if we fail halfway, we're in a reasonable shape to
perform the rest of the teardown. While at it, reset the vgic model
on failure, just in case...
Published: 2026-05-08
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The fault stems from the Linux kernel’s KVM arm64 code that initializes the virtual Generic Interrupt Controller (VGIC) distribution domain. If the helper function `vgic_allocate_private_irqs_locked()` fails, the main creation routine exits early and leaves the region descriptors (`dist->rd_regions`) uninitialized. When the VGIC teardown routine later runs, it attempts to free these uninitialized regions, which can cause a kernel panic or crash. Based on the description, it is inferred that successful exploitation of this flaw would result in a denial‑of‑service condition on the host or virtual machine rather than remote code execution or privilege escalation.

Affected Systems

The problem exists in all Linux kernel releases for arm64 that contain the unpatched KVM VGIC initialization code. It affects hosts running KVM with the VGIC feature enabled. No specific vendor or distribution versions are listed beyond the generic Linux kernel, so any distribution that relies on the upstream kernel source for arm64 hosts is potentially vulnerable until the corrective commit is incorporated.

Risk and Exploitability

The CVSS score of 5.5 indicates moderate severity. No publicly documented exploits are available, and the EPSS score is not provided. The vulnerability is not listed in the CISA KEV catalog. Exploitation would require privileged access to the host to trigger VM creation or destruction that paths through the failing code path, so the most likely attack vector is local privileged. The overall risk is medium for systems that frequently spin up KVM guests on arm64 hardware, because a crash could affect the entire host.

Generated by OpenCVE AI on May 9, 2026 at 03:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that includes the commit that repairs VGIC initialization; the patch is referenced in the kernel Git repository.
  • If an immediate kernel upgrade is not feasible, disable the KVM VGIC feature by rebuilding the kernel with the configuration option `CONFIG_KVM_VGIC` disabled or by removing the vgic module, to avoid the faulty code path.
  • Check with your Linux distribution's security advisories for back‑ported fixes and apply any available updated kernel package that contains the fix.

Generated by OpenCVE AI on May 9, 2026 at 03:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 02:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-665
CWE-788

Sat, 09 May 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-824
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Fri, 08 May 2026 16:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-665
CWE-788

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Eagerly init vgic dist/redist on vgic creation If vgic_allocate_private_irqs_locked() fails for any odd reason, we exit kvm_vgic_create() early, leaving dist->rd_regions uninitialised. kvm_vgic_dist_destroy() then comes along and walks into the weeds trying to free the RDs. Got to love this stuff. Solve it by moving all the static initialisation early, and make sure that if we fail halfway, we're in a reasonable shape to perform the rest of the teardown. While at it, reset the vgic model on failure, just in case...
Title KVM: arm64: Eagerly init vgic dist/redist on vgic creation
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T14:21:08.868Z

Reserved: 2026-05-01T14:12:56.003Z

Link: CVE-2026-43351

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:45.830

Modified: 2026-05-08T15:16:45.830

Link: CVE-2026-43351

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43351 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T04:00:14Z

Weaknesses