CVE-2026-31788

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/03/2026
Last modified:
24/04/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> xen/privcmd: restrict usage in unprivileged domU<br /> <br /> The Xen privcmd driver allows to issue arbitrary hypercalls from<br /> user space processes. This is normally no problem, as access is<br /> usually limited to root and the hypervisor will deny any hypercalls<br /> affecting other domains.<br /> <br /> In case the guest is booted using secure boot, however, the privcmd<br /> driver would be enabling a root user process to modify e.g. kernel<br /> memory contents, thus breaking the secure boot feature.<br /> <br /> The only known case where an unprivileged domU is really needing to<br /> use the privcmd driver is the case when it is acting as the device<br /> model for another guest. In this case all hypercalls issued via the<br /> privcmd driver will target that other guest.<br /> <br /> Fortunately the privcmd driver can already be locked down to allow<br /> only hypercalls targeting a specific domain, but this mode can be<br /> activated from user land only today.<br /> <br /> The target domain can be obtained from Xenstore, so when not running<br /> in dom0 restrict the privcmd driver to that target domain from the<br /> beginning, resolving the potential problem of breaking secure boot.<br /> <br /> This is XSA-482<br /> <br /> ---<br /> V2:<br /> - defer reading from Xenstore if Xenstore isn&amp;#39;t ready yet (Jan Beulich)<br /> - wait in open() if target domain isn&amp;#39;t known yet<br /> - issue message in case no target domain found (Jan Beulich)

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 2.6.37.1 (including) 5.10.253 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.203 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.167 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.130 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.78 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.18.20 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.19 (including) 6.19.10 (excluding)
cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*