Integer overflow in Linux kernel - CVE-2026-31648

 

Integer overflow in Linux kernel - CVE-2026-31648

Published: April 25, 2026


Vulnerability identifier: #VU127743
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2026-31648
CWE-ID: CWE-190
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Linux Foundation
Affected software:
Linux kernel

Detailed vulnerability description

The vulnerability allows a local user to cause memory corruption.

The vulnerability exists due to an integer overflow in filemap_map_pages() when mapping file-backed folios during a race with file size truncation. A local user can trigger the race to cause memory corruption.

The issue can cause mappings to extend beyond the large folio size and corrupt fields of pages that do not belong to that folio.


How to mitigate CVE-2026-31648

Install security update from vendor's repository.

Sources