In the Linux kernel, the following vulnerability has been resolved:
KVM: SEV: Drop WARN on large size for KVM_MEMORY_ENCRYPT_REG_REGION
Drop the WARN in sev_pin_memory() on npages overflowing an int, as the
WARN is comically trivially to trigger from userspace, e.g. by doing:
struct kvm_enc_region range = {
.addr = 0,
.size = -1ul,
};
__vm_ioctl(vm, KVM_MEMORY_ENCRYPT_REG_REGION, &range);
Note, the checks in sev_mem_enc_register_region() that presumably exist to
verify the incoming address+size are completely worthless, as both "addr"
and "size" are u64s and SEV is 64-bit only, i.e. they _can't_ be greater
than ULONG_MAX. That wart will be cleaned up in the near future.
if (range->addr > ULONG_MAX || range->size > ULONG_MAX)
return -EINVAL;
Opportunistically add a comment to explain why the code calculates the
number of pages the "hard" way, e.g. instead of just shifting @ulen.
References
Configurations
Configuration 1 (hide)
|
History
28 Apr 2026, 20:38
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | NVD-CWE-noinfo | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux
Linux linux Kernel |
|
| References | () https://git.kernel.org/stable/c/1cba4dcd795daf6d257122779fb6a349edf03914 - Patch | |
| References | () https://git.kernel.org/stable/c/28cc13ca20431b127d42d84ba10898d03e2c8267 - Patch | |
| References | () https://git.kernel.org/stable/c/8acffeef5ef720c35e513e322ab08e32683f32f2 - Patch | |
| References | () https://git.kernel.org/stable/c/ab423e5892826202a660b5ac85d1125b0e8301a5 - Patch | |
| References | () https://git.kernel.org/stable/c/b670833749ffd8681361db2bb047c6f2e3075f3a - Patch | |
| References | () https://git.kernel.org/stable/c/c29ff288a2d97a6f4640a498a367cf0eb91312eb - Patch | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
27 Apr 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
27 Apr 2026, 12:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
24 Apr 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-24 15:16
Updated : 2026-04-28 20:38
NVD link : CVE-2026-31590
Mitre link : CVE-2026-31590
CVE.ORG link : CVE-2026-31590
JSON object : View
Products Affected
linux
- linux_kernel
CWE
