From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 33C773E8681 for ; Fri, 8 May 2026 14:22:17 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778250138; cv=none; b=KHDmL4VfaiJ8mxD+/ArMDVWWUl+PhvoNtvGSZOA9mIsocS3MUgaZ5AkM85Dy63B5mNvyCqlnTRKQKkqecJCWy3mIoQQELVrMygp3fJ8spOz7pG1GQDaXMVtTSickRQyKWhtv+KOoAfszYSL3jGDiX1lbkIfkQ2QcIBgyiZc7l7g= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778250138; c=relaxed/simple; bh=SfG8JA803Sxjv+bucQZw23ySXH/J2gqq7fb3Vcb+HgY=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=bJZNF21W3o/0ArTbOft6gtYnNgGJMz+d0Xkpa+37+ggwURQE+WcaQvr1zdfQNt4M0L8xPUTbEFR6LosG6JY4Fnjh3hzjgnXabiood7kXZAiNTnJj2J0rcnddxVoIzmYPn5O50WJeA2/WZto0DK01fqbbMGY8h8ZxLNrYtiPzvCQ= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=lBh00B7R; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="lBh00B7R" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 8430DC2BCB0; Fri, 8 May 2026 14:22:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1778250137; bh=SfG8JA803Sxjv+bucQZw23ySXH/J2gqq7fb3Vcb+HgY=; h=From:To:Cc:Subject:Date:Reply-To:From; b=lBh00B7R81HrHDQZXrtmUJsRtEhTl0Y3WjcExGYxfkNPF/qLC9k6bv+xqW06MBElM UM9k144zpKq9N79aSyHy124m8uqdKlAfgxpQPQrVFDooDTjAklHTRqS5akfKiZJlXy LdBMFbSjg+EYSo4sZyyB6r3HuKS2ZApW8n9OT79U= From: Greg Kroah-Hartman To: linux-cve-announce@vger.kernel.org Cc: Greg Kroah-Hartman Subject: CVE-2026-43351: KVM: arm64: Eagerly init vgic dist/redist on vgic creation Date: Fri, 8 May 2026 16:21:20 +0200 Message-ID: <2026050820-CVE-2026-43351-da54@gregkh> X-Mailer: git-send-email 2.54.0 Reply-To: , Precedence: bulk X-Mailing-List: linux-cve-announce@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Developer-Signature: v=1; a=openpgp-sha256; l=2485; i=gregkh@linuxfoundation.org; h=from:subject:message-id; bh=r1ctfjYgDACTMxw0iajliEWYQsi+eEtT8TFYuo+roSU=; b=owGbwMvMwCRo6H6F97bub03G02pJDJl/PyYcOPG37KDyBMW8FxxXlXaK7E3Mtt4wlU2zuujqz YwD9dlrOmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAibocY5pdr3vq2m19uq6Ca bOQWp1/J0b2pJgwL9p67ce7wokV/ZMVkzkwzZ1no9oxXFQA= X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp; fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29 Content-Transfer-Encoding: 8bit From: Greg Kroah-Hartman Description =========== In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Eagerly init vgic dist/redist on vgic creation If vgic_allocate_private_irqs_locked() fails for any odd reason, we exit kvm_vgic_create() early, leaving dist->rd_regions uninitialised. kvm_vgic_dist_destroy() then comes along and walks into the weeds trying to free the RDs. Got to love this stuff. Solve it by moving all the static initialisation early, and make sure that if we fail halfway, we're in a reasonable shape to perform the rest of the teardown. While at it, reset the vgic model on failure, just in case... The Linux kernel CVE team has assigned CVE-2026-43351 to this issue. Affected and fixed versions =========================== Issue introduced in 6.14 with commit b3aa9283c0c505b5cfd25f7d6cfd720de2adc807 and fixed in 6.18.19 with commit b7493f48c3dba75674a4ee505b4afa8fe5102457 Issue introduced in 6.14 with commit b3aa9283c0c505b5cfd25f7d6cfd720de2adc807 and fixed in 6.19.9 with commit a24f1d80fbcdbf8b2a7044a00fa12b3972b4c31c Issue introduced in 6.14 with commit b3aa9283c0c505b5cfd25f7d6cfd720de2adc807 and fixed in 7.0 with commit ac6769c8f948dff33265c50e524aebf9aa6f1be0 Please see https://www.kernel.org for a full list of currently supported kernel versions by the kernel community. Unaffected versions might change over time as fixes are backported to older supported kernel versions. The official CVE entry at https://cve.org/CVERecord/?id=CVE-2026-43351 will be updated if fixes are backported, please check that for the most up to date information about this issue. Affected files ============== The file(s) affected by this issue are: arch/arm64/kvm/vgic/vgic-init.c Mitigation ========== The Linux kernel CVE team recommends that you update to the latest stable kernel version for this, and many other bugfixes. Individual changes are never tested alone, but rather are part of a larger kernel release. Cherry-picking individual commits is not recommended or supported by the Linux kernel community at all. If however, updating to the latest release is impossible, the individual changes to resolve this issue can be found at these commits: https://git.kernel.org/stable/c/b7493f48c3dba75674a4ee505b4afa8fe5102457 https://git.kernel.org/stable/c/a24f1d80fbcdbf8b2a7044a00fa12b3972b4c31c https://git.kernel.org/stable/c/ac6769c8f948dff33265c50e524aebf9aa6f1be0