CVE-2026-43248
Awaiting Analysis Awaiting Analysis - Queue
Vhost vdpa Group Validation Bypass in Linux Kernel

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: vhost: move vdpa group bound check to vhost_vdpa Remove duplication by consolidating these here. This reduces the posibility of a parent driver missing them. While we're at it, fix a bug in vdpa_sim where a valid ASID can be assigned to a group equal to ngroups, causing an out of bound write.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the Linux kernel involves the vhost subsystem, specifically related to the vdpa (vhost data path acceleration) group bound checks. The issue was that the bound checks were duplicated and not consolidated, increasing the risk that a parent driver might miss them. Additionally, there was a bug in vdpa_sim where a valid ASID (Address Space ID) could be assigned to a group equal to the number of groups (ngroups), which caused an out-of-bounds write.


How can this vulnerability impact me? :

The vulnerability can lead to an out-of-bounds write in the Linux kernel's vhost subsystem. This type of memory corruption can potentially cause system instability, crashes, or be exploited to execute arbitrary code with kernel privileges, depending on the context and exploitability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart