CVE-2026-31788 — Incorrect Privilege Assignment in Linux
Severity
8.2HIGHNVD
EPSS
0.0%
top 97.25%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 25
Description
In the Linux kernel, the following vulnerability has been resolved:
xen/privcmd: restrict usage in unprivileged domU
The Xen privcmd driver allows to issue arbitrary hypercalls from
user space processes. This is normally no problem, as access is
usually limited to root and the hypervisor will deny any hypercalls
affecting other domains.
In case the guest is booted using secure boot, however, the privcmd
driver would be enabling a root user process to modify e.g. kernel
memory contents, thus b…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:HExploitability: 1.5 | Impact: 6.0
Affected Packages4 packages
▶CVEListV5linux/linux1c5de1939c204bde9cce87f4eb3d26e9f9eb732b — 87a803edb2ded911cb587c53bff179d2a2ed2a28+6
🔴Vulnerability Details
3GHSA▶
GHSA-q397-v647-xvh6: In the Linux kernel, the following vulnerability has been resolved:
xen/privcmd: restrict usage in unprivileged domU
The Xen privcmd driver allows t↗2026-03-25
OSV▶
CVE-2026-31788: In the Linux kernel, the following vulnerability has been resolved: xen/privcmd: restrict usage in unprivileged domU The Xen privcmd driver allows to↗2026-03-25