CVE-2026-43214

Source
https://cve.org/CVERecord?id=CVE-2026-43214
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-43214.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-43214
Downstream
Published
2026-05-06T11:28:16.766Z
Modified
2026-05-18T06:00:14.380304872Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
KVM: x86: Add SRCU protection for reading PDPTRs in __get_sregs2()
Details

In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Add SRCU protection for reading PDPTRs in _getsregs2()

Add SRCU read-side protection when reading PDPTR registers in _getsregs2().

Reading PDPTRs may trigger access to guest memory: kvmpdptrread() -> svmcachereg() -> loadpdptrs() -> kvmvcpureadguestpage() -> kvmvcpugfnto_memslot()

kvmvcpugfntomemslot() dereferences memslots via __kvmmemslots(), which uses srcudereferencecheck() and requires either kvm->srcu or kvm->slotslock to be held. Currently only vcpu->mutex is held, triggering lockdep warning:

============================= WARNING: suspicious RCU usage in kvmvcpugfntomemslot 6.12.59+ #3 Not tainted

include/linux/kvmhost.h:1062 suspicious rcudereference_check() usage!

other info that might help us debug this:

rcuscheduleractive = 2, debuglocks = 1 1 lock held by syz.5.1717/15100: #0: ff1100002f4b00b0 (&vcpu->mutex){+.+.}-{3:3}, at: kvmvcpu_ioctl+0x1d5/0x1590

Call Trace: <TASK> __dumpstack lib/dumpstack.c:94 [inline] dump_stacklvl+0xf0/0x120 lib/dumpstack.c:120 lockdeprcususpicious+0x1e3/0x270 kernel/locking/lockdep.c:6824 __kvmmemslots include/linux/kvmhost.h:1062 [inline] __kvmmemslots include/linux/kvmhost.h:1059 [inline] kvmvcpumemslots include/linux/kvmhost.h:1076 [inline] kvmvcpugfntomemslot+0x518/0x5e0 virt/kvm/kvmmain.c:2617 kvmvcpureadguestpage+0x27/0x50 virt/kvm/kvmmain.c:3302 loadpdptrs+0xff/0x4b0 arch/x86/kvm/x86.c:1065 svmcachereg+0x1c9/0x230 arch/x86/kvm/svm/svm.c:1688 kvmpdptrread arch/x86/kvm/kvmcacheregs.h:141 [inline] __getsregs2 arch/x86/kvm/x86.c:11784 [inline] kvmarchvcpuioctl+0x3e20/0x4aa0 arch/x86/kvm/x86.c:6279 kvmvcpuioctl+0x856/0x1590 virt/kvm/kvmmain.c:4663 vfsioctl fs/ioctl.c:51 [inline] __dosysioctl fs/ioctl.c:907 [inline] __sesysioctl fs/ioctl.c:893 [inline] __x64sysioctl+0x18b/0x210 fs/ioctl.c:893 dosyscallx64 arch/x86/entry/common.c:52 [inline] dosyscall64+0xbd/0x1d0 arch/x86/entry/common.c:83 entrySYSCALL64afterhwframe+0x77/0x7f

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/43xxx/CVE-2026-43214.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
6dba940352038b56db9b591b172fb2ec76a5fd5e
Fixed
f621ca24f9f489e226e22560761b04884984133b
Fixed
708e20c66b2761d878a2bc3c7534e7f814e4dec5
Fixed
9f2bfea51151dfbb24b52f452eb3d5f5fe0e506e
Fixed
57536ff0a6bd69a5808d682925202babdb5ddc13
Fixed
b33f8d816950b10e7879cd8ffd7ae4b649ada4db
Fixed
95d848dc7e639988dbb385a8cba9b484607cf98c

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-43214.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.14.0
Fixed
6.1.165
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.128
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.75
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.16
Type
ECOSYSTEM
Events
Introduced
6.19.0
Fixed
6.19.6

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-43214.json"