VYPR
High severity8.8NVD Advisory· Published Apr 24, 2026· Updated Apr 27, 2026

CVE-2026-31553

CVE-2026-31553

Description

In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: Fix the descriptor address in __kvm_at_swap_desc()

Using "(u64 __user *)hva + offset" to get the virtual addresses of S1/S2 descriptors looks really wrong, if offset is not zero. What we want to get for swapping is hva + offset, not hva + offset*8. ;-)

Fix it.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A pointer arithmetic error in KVM arm64's __kvm_at_swap_desc() causes incorrect descriptor address calculation, potentially leading to memory corruption or privilege escalation.

Vulnerability

Description

In the Linux kernel's KVM for arm64, the function __kvm_at_swap_desc() contains a pointer arithmetic bug when computing the address of stage-1 (S1) and stage-2 (S2) page table descriptors. The code uses (u64 __user *)hva + offset, which adds offset multiplied by the size of u64 (8 bytes) due to C pointer arithmetic, instead of the intended byte offset hva + offset. This results in accessing memory at an incorrect location, potentially corrupting page table entries or reading from unintended addresses.

Exploitation

The vulnerability resides in the KVM subsystem, which requires elevated privileges (typically root or CAP_SYS_ADMIN) to create and manage virtual machines. An attacker with such access could trigger the bug during descriptor swapping operations, which occur when the hypervisor updates page table mappings. The exact attack surface depends on the ability to control the offset parameter, which may be influenced by guest-controlled data in certain scenarios.

Impact

Successful exploitation could lead to memory corruption within the host kernel, potentially causing denial of service (system crash) or, in more severe cases, privilege escalation from a guest VM to the host. The CVSS v3 score of 8.8 reflects high impacts on confidentiality, integrity, and availability.

Mitigation

The fix has been applied in the Linux kernel stable branches via commits [1] and [2]. Users should update their kernel to a version containing these patches. Distributions have likely backported the fix; administrators are advised to apply the latest security updates.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

9
  • Linux/Kernel9 versions
    cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 8 more
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=6.19.1,<6.19.11
    • cpe:2.3:o:linux:linux_kernel:6.19:-:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.