Bug 2467065 (CVE-2026-43133) - CVE-2026-43133 kernel: KVM: nSVM: Always use vmcb01 in VMLOAD/VMSAVE emulation
Summary: CVE-2026-43133 kernel: KVM: nSVM: Always use vmcb01 in VMLOAD/VMSAVE emulation
Keywords:
Status: NEW
Alias: CVE-2026-43133
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-05-06 13:02 UTC by OSIDB Bzimport
Modified: 2026-05-06 18:06 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-05-06 13:02:22 UTC
In the Linux kernel, the following vulnerability has been resolved:

KVM: nSVM: Always use vmcb01 in VMLOAD/VMSAVE emulation

Commit cc3ed80ae69f ("KVM: nSVM: always use vmcb01 to for vmsave/vmload
of guest state") made KVM always use vmcb01 for the fields controlled by
VMSAVE/VMLOAD, but it missed updating the VMLOAD/VMSAVE emulation code
to always use vmcb01.

As a result, if VMSAVE/VMLOAD is executed by an L2 guest and is not
intercepted by L1, KVM will mistakenly use vmcb02. Always use vmcb01
instead of the current VMCB.


Note You need to log in before you can comment on or make changes to this bug.