VYPR
Medium severity5.5NVD Advisory· Published May 1, 2026· Updated May 12, 2026

CVE-2026-31785

CVE-2026-31785

Description

In the Linux kernel, the following vulnerability has been resolved:

drm/xe/xe_pagefault: Disallow writes to read-only VMAs

The page fault handler should reject write/atomic access to read only VMAs. Add code to handle this in xe_pagefault_service after the VMA lookup.

v2: - Apply max line length (Matthew)

(cherry picked from commit 714ee6754ac5fa3dc078856a196a6b124cd797a0)

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A missing permission check in the Linux kernel's DRM/XE page fault handler allows write access to read-only VMAs, potentially leading to memory corruption or privilege escalation.

Vulnerability

Overview

The Linux kernel's DRM/XE page fault handler, in the xe_pagefault_service function, fails to reject write or atomic access to read-only virtual memory areas (VMAs). This missing permission check allows a page fault to be serviced even when the VMA is marked read-only, violating the expected memory protection semantics.

Exploitation

Prerequisites

An attacker must have local access to the system and the ability to trigger page faults on GPU memory mappings managed by the XE driver. This typically requires some level of user-space access to the DRM/XE subsystem, such as being able to submit GPU commands or manipulate buffer objects. No special privileges beyond local user access are necessary.

Impact

If successfully exploited, an attacker could write to memory regions that should be read-only, leading to memory corruption. This could be leveraged to escalate privileges, cause a denial of service, or potentially leak sensitive information. The vulnerability is rated Medium (CVSS 5.5) due to the requirement for local access and the need to interact with the GPU driver.

Mitigation

The fix has been applied in the Linux kernel and backported to stable branches via commits [1] and [2]. Users should update their kernel to a version containing the fix or apply the relevant patch. No workaround is available.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.