| Summary | In the Linux kernel, the following vulnerability has been resolved: xen/privcmd: fix double free via VMA splitting privcmd_vm_ops defines .close (privcmd_close), but neither .may_split Both VMAs now point to the same pages array. When the unmapped portion The surviving VMA still holds the dangling pointer. When it is later Fix this issue by adding a .may_split callback denying the VMA split. This is XSA-487 / CVE-2026-31787 |
|---|---|
| Publication Date | April 30, 2026, 8:16 p.m. |
| Registration Date | May 1, 2026, 4:07 a.m. |
| Last Update | May 1, 2026, 2:11 a.m. |