Integer overflow in Linux kernel - CVE-2026-31525

 

Integer overflow in Linux kernel - CVE-2026-31525

Published: April 24, 2026


Vulnerability identifier: #VU127623
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2026-31525
CWE-ID: CWE-190
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Linux Foundation
Affected software:
Linux kernel

Detailed vulnerability description

The vulnerability allows a local user to access out-of-bounds map values.

The vulnerability exists due to improper handling of signed integer minimum values in the BPF interpreter's signed 32-bit division and modulo handlers when processing crafted BPF operations that use INT_MIN. A local user can load a crafted BPF program to access out-of-bounds map values.

The issue is caused by a verifier and interpreter mismatch in range tracking for signed 32-bit division and modulo operations.


How to mitigate CVE-2026-31525

Install security update from vendor's repository.

Sources