An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to trigger out-of-bounds heap accesses in the QEMU process via the emulated Xen physdev hypercall interface, leading to a denial of service or potential memory corruption.

Project Subscriptions

Vendors Products
Enterprise Linux Subscribe
Openshift Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 18 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Feb 2026 21:00:00 +0000

Type Values Removed Values Added
Title qemu-kvm: Heap off-by-one in KVM Xen PHYSDEVOP_map_pirq Qemu-kvm: heap off-by-one in kvm xen physdevop_map_pirq
First Time appeared Redhat
Redhat enterprise Linux
Redhat openshift
CPEs cpe:/a:redhat:openshift:4
cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
Redhat openshift
References

Tue, 13 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
Description An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to trigger out-of-bounds heap accesses in the QEMU process via the emulated Xen physdev hypercall interface, leading to a denial of service or potential memory corruption.
Title qemu-kvm: Heap off-by-one in KVM Xen PHYSDEVOP_map_pirq
Weaknesses CWE-125
CWE-787
References
Metrics threat_severity

None

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H'}

threat_severity

Moderate


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: fedora

Published:

Updated: 2026-02-18T21:27:14.216Z

Reserved: 2026-01-07T12:09:11.643Z

Link: CVE-2026-0665

cve-icon Vulnrichment

Updated: 2026-02-18T21:27:06.428Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-18T21:16:22.633

Modified: 2026-02-19T15:53:02.850

Link: CVE-2026-0665

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-01-09T00:00:00Z

Links: CVE-2026-0665 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses