CVE-2026-43214
KVM: SRCU Protection Missing in PDPTR Register Read
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.12.59+ |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's KVM (Kernel-based Virtual Machine) subsystem for x86 architectures. It involves the lack of SRCU (Sleepable Read-Copy Update) read-side protection when reading PDPTR (Page Directory Pointer Table Register) registers in the __get_sregs2() function.
Reading PDPTRs can trigger access to guest memory through a chain of function calls that eventually dereference memory slots without holding the required SRCU or slots_lock protections. Instead, only a mutex is held, which leads to a lock dependency warning and suspicious RCU usage.
The issue was identified by the Linux Verification Center using the Syzkaller tool and was resolved by adding SRCU read-side protection to ensure safe access to these memory structures.
How can this vulnerability impact me? :
This vulnerability could potentially lead to unsafe memory access within the KVM subsystem when reading PDPTR registers, which might cause kernel instability or unexpected behavior due to improper synchronization.
While the description does not explicitly mention exploitation or direct security impact such as privilege escalation or information disclosure, the improper locking and memory access could lead to system crashes or data corruption in virtualized environments.