U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2026-31787 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: xen/privcmd: fix double free via VMA splitting privcmd_vm_ops defines .close (privcmd_close), but neither .may_split nor .open. When userspace does a partial munmap() on a privcmd mapping, the kernel splits the VMA via __split_vma(). Since may_split is NULL, the split is allowed. vm_area_dup() copies vm_private_data (a pages array allocated in alloc_empty_pages()) into the new VMA without any fixup, because there is no .open callback. Both VMAs now point to the same pages array. When the unmapped portion is closed, privcmd_close() calls: - xen_unmap_domain_gfn_range() - xen_free_unpopulated_pages() - kvfree(pages) The surviving VMA still holds the dangling pointer. When it is later destroyed, the same sequence runs again, which leads to a double free. Fix this issue by adding a .may_split callback denying the VMA split. This is XSA-487 / CVE-2026-31787


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
http://www.openwall.com/lists/oss-security/2026/04/28/14 CVE Mailing List  Third Party Advisory 
http://xenbits.xen.org/xsa/advisory-487.html CVE Third Party Advisory 
https://git.kernel.org/stable/c/1576ff3869cbd3620717195f971c85b7d7fd62b5 kernel.org Patch 
https://git.kernel.org/stable/c/24daca4fc07f3ff8cd0e3f629cd982187f48436a kernel.org Patch 
https://git.kernel.org/stable/c/2894a351fe2ea8684919d36df3188b9a35e3926f kernel.org Patch 
https://git.kernel.org/stable/c/2b985d3a024b9e8c24e21671b34e855569763808 kernel.org Patch 
https://git.kernel.org/stable/c/402d84ad9e89bd4cbfd07ca8598532b7021daf95 kernel.org Patch 
https://git.kernel.org/stable/c/446ee446d9ae66f36e95c3c90bbcc4e56b94cde0 kernel.org Patch 
https://git.kernel.org/stable/c/71bf829800758a6e3889096e4754ef47ba7fc850 kernel.org Patch 
https://git.kernel.org/stable/c/dbf862ce9f009128ab86b234d91413a3e450beb4 kernel.org Patch 

Weakness Enumeration

CWE-ID CWE Name Source
CWE-415 Double Free cwe source acceptance level NIST  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

4 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2026-31787
NVD Published Date:
04/30/2026
NVD Last Modified:
05/06/2026
Source:
kernel.org