๐Ÿ” CVE Alert

CVE-2026-31787

UNKNOWN 0.0

xen/privcmd: fix double free via VMA splitting

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: xen/privcmd: fix double free via VMA splitting privcmd_vm_ops defines .close (privcmd_close), but neither .may_split nor .open. When userspace does a partial munmap() on a privcmd mapping, the kernel splits the VMA via __split_vma(). Since may_split is NULL, the split is allowed. vm_area_dup() copies vm_private_data (a pages array allocated in alloc_empty_pages()) into the new VMA without any fixup, because there is no .open callback. Both VMAs now point to the same pages array. When the unmapped portion is closed, privcmd_close() calls: - xen_unmap_domain_gfn_range() - xen_free_unpopulated_pages() - kvfree(pages) The surviving VMA still holds the dangling pointer. When it is later destroyed, the same sequence runs again, which leads to a double free. Fix this issue by adding a .may_split callback denying the VMA split. This is XSA-487 / CVE-2026-31787

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 30, 2026
Last Updated Apr 30, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < dbf862ce9f009128ab86b234d91413a3e450beb4 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 2b985d3a024b9e8c24e21671b34e855569763808 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 1576ff3869cbd3620717195f971c85b7d7fd62b5 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 402d84ad9e89bd4cbfd07ca8598532b7021daf95 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 2894a351fe2ea8684919d36df3188b9a35e3926f 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 446ee446d9ae66f36e95c3c90bbcc4e56b94cde0 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 71bf829800758a6e3889096e4754ef47ba7fc850
Linux / Linux
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/dbf862ce9f009128ab86b234d91413a3e450beb4 git.kernel.org: https://git.kernel.org/stable/c/2b985d3a024b9e8c24e21671b34e855569763808 git.kernel.org: https://git.kernel.org/stable/c/1576ff3869cbd3620717195f971c85b7d7fd62b5 git.kernel.org: https://git.kernel.org/stable/c/402d84ad9e89bd4cbfd07ca8598532b7021daf95 git.kernel.org: https://git.kernel.org/stable/c/2894a351fe2ea8684919d36df3188b9a35e3926f git.kernel.org: https://git.kernel.org/stable/c/446ee446d9ae66f36e95c3c90bbcc4e56b94cde0 git.kernel.org: https://git.kernel.org/stable/c/71bf829800758a6e3889096e4754ef47ba7fc850 openwall.com: http://www.openwall.com/lists/oss-security/2026/04/28/14 xenbits.xen.org: http://xenbits.xen.org/xsa/advisory-487.html