CVE-2026-31788Incorrect Privilege Assignment in Linux

Severity
8.2HIGHNVD
EPSS
0.0%
top 97.25%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 25

Description

In the Linux kernel, the following vulnerability has been resolved: xen/privcmd: restrict usage in unprivileged domU The Xen privcmd driver allows to issue arbitrary hypercalls from user space processes. This is normally no problem, as access is usually limited to root and the hypervisor will deny any hypercalls affecting other domains. In case the guest is booted using secure boot, however, the privcmd driver would be enabling a root user process to modify e.g. kernel memory contents, thus b

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:HExploitability: 1.5 | Impact: 6.0

Affected Packages4 packages

Linuxlinux/linux_kernel2.6.376.1.167+4
Debianlinux/linux_kernel< 6.19.10-1
CVEListV5linux/linux1c5de1939c204bde9cce87f4eb3d26e9f9eb732b87a803edb2ded911cb587c53bff179d2a2ed2a28+6
debiandebian/linux< linux 6.19.10-1 (forky)

🔴Vulnerability Details

3
OSV
xen/privcmd: restrict usage in unprivileged domU2026-03-25
GHSA
GHSA-q397-v647-xvh6: In the Linux kernel, the following vulnerability has been resolved: xen/privcmd: restrict usage in unprivileged domU The Xen privcmd driver allows t2026-03-25
OSV
CVE-2026-31788: In the Linux kernel, the following vulnerability has been resolved: xen/privcmd: restrict usage in unprivileged domU The Xen privcmd driver allows to2026-03-25

📋Vendor Advisories

2
Red Hat
kernel: xen/privcmd: restrict usage in unprivileged domU2026-03-25
Debian
CVE-2026-31788: linux - In the Linux kernel, the following vulnerability has been resolved: xen/privcmd...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-31788 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-31788 — Incorrect Privilege Assignment | cvebase