CVE-2026-31591
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
24/04/2026
Last modified:
28/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
KVM: SEV: Lock all vCPUs when synchronzing VMSAs for SNP launch finish<br />
<br />
Lock all vCPUs when synchronizing and encrypting VMSAs for SNP guests, as<br />
allowing userspace to manipulate and/or run a vCPU while its state is being<br />
synchronized would at best corrupt vCPU state, and at worst crash the host<br />
kernel.<br />
<br />
Opportunistically assert that vcpu->mutex is held when synchronizing its<br />
VMSA (the SEV-ES path already locks vCPUs).
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11 (including) | 6.18.24 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.14 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 7.0 (including) | 7.0.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



