CVE-2026-31590
Gravedad CVSS v3.1:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
24/04/2026
Última modificación:
28/04/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
KVM: SEV: Drop WARN on large size for KVM_MEMORY_ENCRYPT_REG_REGION<br />
<br />
Drop the WARN in sev_pin_memory() on npages overflowing an int, as the<br />
WARN is comically trivially to trigger from userspace, e.g. by doing:<br />
<br />
struct kvm_enc_region range = {<br />
.addr = 0,<br />
.size = -1ul,<br />
};<br />
<br />
__vm_ioctl(vm, KVM_MEMORY_ENCRYPT_REG_REGION, &range);<br />
<br />
Note, the checks in sev_mem_enc_register_region() that presumably exist to<br />
verify the incoming address+size are completely worthless, as both "addr"<br />
and "size" are u64s and SEV is 64-bit only, i.e. they _can&#39;t_ be greater<br />
than ULONG_MAX. That wart will be cleaned up in the near future.<br />
<br />
if (range->addr > ULONG_MAX || range->size > ULONG_MAX)<br />
return -EINVAL;<br />
<br />
Opportunistically add a comment to explain why the code calculates the<br />
number of pages the "hard" way, e.g. instead of just shifting @ulen.
Impacto
Puntuación base 3.x
5.50
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.9 (incluyendo) | 6.6.136 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (incluyendo) | 6.12.83 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (incluyendo) | 6.18.24 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (incluyendo) | 6.19.14 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 7.0 (incluyendo) | 7.0.1 (excluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/1cba4dcd795daf6d257122779fb6a349edf03914
- https://git.kernel.org/stable/c/28cc13ca20431b127d42d84ba10898d03e2c8267
- https://git.kernel.org/stable/c/8acffeef5ef720c35e513e322ab08e32683f32f2
- https://git.kernel.org/stable/c/ab423e5892826202a660b5ac85d1125b0e8301a5
- https://git.kernel.org/stable/c/b670833749ffd8681361db2bb047c6f2e3075f3a
- https://git.kernel.org/stable/c/c29ff288a2d97a6f4640a498a367cf0eb91312eb



