The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-31397

CVE-2026-31397: Linux Kernel Use-After-Free Vulnerability

CVE-2026-31397 is a use-after-free flaw in the Linux kernel's mm/huge_memory component affecting move_pages_huge_pmd() function. This post explains its technical details, affected versions, impact, and mitigation steps.

Published: April 10, 2026

CVE-2026-31397 Overview

A use of NULL folio vulnerability exists in the Linux kernel's memory management subsystem, specifically within the move_pages_huge_pmd() function. This function handles UFFDIO_MOVE operations for both normal Transparent Huge Pages (THPs) and huge zero pages. The vulnerability occurs when processing huge zero pages where src_folio is explicitly set to NULL and used as a sentinel to skip folio operations.

In the huge zero page branch, passing NULL through folio_pfn() and page_to_pfn() produces different behaviors depending on the memory model: with SPARSEMEM_VMEMMAP, it silently produces a bogus Page Frame Number (PFN), installing a PMD pointing to non-existent physical memory; on other memory models, it results in a NULL pointer dereference.

Critical Impact

This vulnerability can lead to memory corruption through bogus PMD installation pointing to non-existent physical memory, NULL pointer dereference crashes, and potential refcount corruption when vm_normal_page_pmd() incorrectly treats the moved huge zero PMD as a normal page.

Affected Products

  • Linux Kernel (versions with vulnerable move_pages_huge_pmd() implementation)
  • Systems using Transparent Huge Pages (THP) with UFFDIO_MOVE operations
  • Systems with SPARSEMEM_VMEMMAP or other memory models

Discovery Timeline

  • 2026-04-03 - CVE CVE-2026-31397 published to NVD
  • 2026-04-07 - Last updated in NVD database

Technical Details for CVE-2026-31397

Vulnerability Analysis

The vulnerability resides in the kernel's huge memory management code path that handles page migration operations. When move_pages_huge_pmd() processes huge zero pages, it sets src_folio to NULL as a sentinel value to indicate special handling should be applied. However, this NULL value is subsequently passed to folio_mk_pmd(NULL, pgprot), which internally calls folio_pfn() and page_to_pfn() with a NULL argument.

The behavior depends on the kernel's configured memory model:

  1. SPARSEMEM_VMEMMAP configuration: The NULL dereference silently produces an invalid PFN, causing the kernel to install a Page Middle Directory (PMD) entry pointing to non-existent physical memory addresses.

  2. Other memory models: A direct NULL pointer dereference occurs, causing a kernel crash.

A secondary issue exists where the code reconstructs the destination PMD in the huge zero page branch, inadvertently dropping PMD state such as pmd_special() on architectures with CONFIG_ARCH_HAS_PTE_SPECIAL. This causes vm_normal_page_pmd() to misidentify the moved huge zero PMD as a normal page, leading to refcount corruption.

Root Cause

The root cause is improper handling of the NULL sentinel value for src_folio when processing huge zero pages in move_pages_huge_pmd(). The function uses NULL as a special marker to skip folio operations but fails to account for code paths where the NULL value is dereferenced. Additionally, the PMD reconstruction logic does not preserve critical PMD state flags that were established by commit d82d09e48219, which marked PMD mappings of the huge zero folio as special.

Attack Vector

The vulnerability is triggered through the UFFDIO_MOVE ioctl operation when moving huge zero pages. An attacker with local access and the ability to perform userfaultfd operations could potentially exploit this vulnerability to cause:

  1. Denial of Service: Triggering a kernel NULL pointer dereference crash on non-SPARSEMEM_VMEMMAP systems
  2. Memory Corruption: On SPARSEMEM_VMEMMAP systems, the bogus PMD installation could lead to memory corruption
  3. Refcount Corruption: Through the vm_normal_page_pmd() misidentification issue, potentially affecting memory management integrity

The attack requires local access and the ability to use userfaultfd with UFFDIO_MOVE operations on huge zero pages.

Detection Methods for CVE-2026-31397

Indicators of Compromise

  • Kernel panic logs indicating NULL pointer dereference in move_pages_huge_pmd() or related mm/huge_memory functions
  • System crashes during memory-intensive operations involving Transparent Huge Pages
  • Unexpected memory corruption or system instability when userfaultfd operations are performed
  • Kernel oops messages referencing folio_pfn(), page_to_pfn(), or PMD manipulation functions

Detection Strategies

  • Monitor kernel logs for NULL pointer dereference errors in the memory management subsystem, particularly in functions related to huge page handling
  • Implement kernel crash dump analysis to identify crashes originating from move_pages_huge_pmd() or related THP code paths
  • Deploy runtime kernel integrity monitoring to detect anomalous PMD entries pointing to invalid physical memory addresses
  • Use kernel debugging tools like KASAN (Kernel Address Sanitizer) to detect NULL dereferences during testing

Monitoring Recommendations

  • Enable kernel crash reporting and centralized log collection to capture NULL pointer dereference events across the infrastructure
  • Monitor for unusual userfaultfd activity, particularly UFFDIO_MOVE operations on systems handling sensitive workloads
  • Implement system stability monitoring to detect patterns of crashes that may indicate exploitation attempts
  • Review kernel audit logs for processes performing frequent huge page operations

How to Mitigate CVE-2026-31397

Immediate Actions Required

  • Apply the available kernel patches from the official Linux kernel stable branches immediately
  • Prioritize patching systems that utilize userfaultfd features or run workloads heavily dependent on Transparent Huge Pages
  • Consider disabling userfaultfd for unprivileged users via sysctl vm.unprivileged_userfaultfd=0 as a temporary measure
  • Monitor affected systems for signs of instability or crashes related to memory management

Patch Information

The Linux kernel maintainers have released patches that address this vulnerability by:

  1. Using page_folio(src_page) to obtain the valid huge zero folio from the page (obtained from pmd_page()) instead of passing NULL
  2. Deriving the destination PMD entry from src_pmdval after pmdp_huge_clear_flush() rather than reconstructing it
  3. Handling PMD metadata consistently with move_huge_pmd() by marking it soft-dirty and clearing uffd-wp

Patches are available through the following kernel commits:

  • Kernel Patch e3133d0
  • Kernel Patch f3caaee
  • Kernel Patch fae6540

Workarounds

  • Disable unprivileged userfaultfd access by setting vm.unprivileged_userfaultfd=0 to limit the attack surface to privileged users only
  • If feasible, disable Transparent Huge Pages temporarily using echo never > /sys/kernel/mm/transparent_hugepage/enabled (note: this may impact performance)
  • Restrict access to sensitive systems until patches can be applied
  • Implement application-level controls to limit userfaultfd usage where possible
bash
# Configuration example
# Disable unprivileged userfaultfd access (temporary mitigation)
echo 0 > /proc/sys/vm/unprivileged_userfaultfd

# To make persistent across reboots, add to /etc/sysctl.conf:
# vm.unprivileged_userfaultfd = 0

# Optionally disable Transparent Huge Pages (may impact performance)
echo never > /sys/kernel/mm/transparent_hugepage/enabled
echo never > /sys/kernel/mm/transparent_hugepage/defrag

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeUse After Free

  • Vendor/TechLinux Kernel

  • SeverityNONE

  • CVSS ScoreN/A

  • EPSS Probability0.02%

  • Known ExploitedNo
  • Impact Assessment
  • ConfidentialityNone
  • IntegrityNone
  • AvailabilityNone
  • Technical References
  • Kernel Patch e3133d0

  • Kernel Patch f3caaee

  • Kernel Patch fae6540
  • Related CVEs
  • CVE-2026-31745: Linux Kernel Use-After-Free Vulnerability

  • CVE-2026-43048: Linux Kernel Use-After-Free Vulnerability

  • CVE-2026-43049: Linux Kernel Use-After-Free Vulnerability

  • CVE-2026-43056: Linux Kernel Use-After-Free Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English