CVE-2026-31788
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/03/2026
Last modified:
25/03/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
xen/privcmd: restrict usage in unprivileged domU<br />
<br />
The Xen privcmd driver allows to issue arbitrary hypercalls from<br />
user space processes. This is normally no problem, as access is<br />
usually limited to root and the hypervisor will deny any hypercalls<br />
affecting other domains.<br />
<br />
In case the guest is booted using secure boot, however, the privcmd<br />
driver would be enabling a root user process to modify e.g. kernel<br />
memory contents, thus breaking the secure boot feature.<br />
<br />
The only known case where an unprivileged domU is really needing to<br />
use the privcmd driver is the case when it is acting as the device<br />
model for another guest. In this case all hypercalls issued via the<br />
privcmd driver will target that other guest.<br />
<br />
Fortunately the privcmd driver can already be locked down to allow<br />
only hypercalls targeting a specific domain, but this mode can be<br />
activated from user land only today.<br />
<br />
The target domain can be obtained from Xenstore, so when not running<br />
in dom0 restrict the privcmd driver to that target domain from the<br />
beginning, resolving the potential problem of breaking secure boot.<br />
<br />
This is XSA-482<br />
<br />
---<br />
V2:<br />
- defer reading from Xenstore if Xenstore isn&#39;t ready yet (Jan Beulich)<br />
- wait in open() if target domain isn&#39;t known yet<br />
- issue message in case no target domain found (Jan Beulich)
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1879319d790f7d57622cdc22807b60ea78b56b6d
- https://git.kernel.org/stable/c/389bae9a4409934e8b8d4dbdaaf02a3ae71cf8e4
- https://git.kernel.org/stable/c/78432d8f0372c71c518096395537fa12be7ff24e
- https://git.kernel.org/stable/c/87a803edb2ded911cb587c53bff179d2a2ed2a28
- https://git.kernel.org/stable/c/cbede2e833da1893afbea9b3ff29b5dda23a4a91
- http://www.openwall.com/lists/oss-security/2026/03/24/2
- http://www.openwall.com/lists/oss-security/2026/03/24/3
- http://www.openwall.com/lists/oss-security/2026/03/24/4
- http://www.openwall.com/lists/oss-security/2026/03/24/5
- http://xenbits.xen.org/xsa/advisory-482.html



