Integer overflow in Linux kernel - CVE-2026-31648
Published: April 25, 2026
Linux kernel
Detailed vulnerability description
The vulnerability allows a local user to cause memory corruption.
The vulnerability exists due to an integer overflow in filemap_map_pages() when mapping file-backed folios during a race with file size truncation. A local user can trigger the race to cause memory corruption.
The issue can cause mappings to extend beyond the large folio size and corrupt fields of pages that do not belong to that folio.
How to mitigate CVE-2026-31648
Sources
- https://git.kernel.org/stable/c/576543bedd616254032d4ebe54a90076f9e31740
- https://git.kernel.org/stable/c/633ab680c405ac390e6bec5b74aaf46197c837b6
- https://git.kernel.org/stable/c/88591194df736a508dd5461ab2167a61e98caac1
- https://git.kernel.org/stable/c/9316a820b9aae07d44469d6485376dad824c5b3f
- https://git.kernel.org/stable/c/f58df566524ebcdfa394329c64f47e3c9257516e