Lyrie
Critical CVE
CVSS 9.83 sources verified·1 min read
By Lyrie Threat Intelligence·4/27/2026

CRITICAL: CVE-2026-31463 (CVSS 9.8) — multiple products

CVE: CVE-2026-31463

CVSS: 9.8 (3.1) — CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: CRITICAL

Status: Critical advisory

Affected

_See vendor advisory_

Summary

In the Linux kernel, the following vulnerability has been resolved:

iomap: fix invalid folio access when i_blkbits differs from I/O granularity

Commit aa35dd5cbc06 ("iomap: fix invalid folio access after

folio_end_read()") partially addressed invalid folio access for folios

without an ifs attached, but it did not handle the case where

1 << inode->i_blkbits matches the folio size but is different from the

granularity used for the IO, which means IO can be submitted for less

than the full folio for the !ifs case.

In this case, the condition:

if (*bytes_submitted == folio_len)

ctx->cur_folio = NULL;

in iomap_read_folio_iter() will not invalidate ctx->cur_folio, and

iomap_read_end() will still be called on the folio even though the IO

helper owns it and will finish the read on it.

Fix this by unconditionally invalidating ctx->cur_folio for the !ifs

case.

Verified Sources

References

  • https://git.kernel.org/stable/c/4a927f670cdb0def226f9f85f42a9f19d9e09c88
  • https://git.kernel.org/stable/c/bd71fb3fea9945987053968f028a948997cba8cc

_Validated by the Lyrie Threat Intelligence Pipeline — 3 independent sources confirmed before publication. No speculation._

Lyrie Verdict

A vulnerability of this severity is exactly what Lyrie's anti-rogue-AI defense is built for: continuous, autonomous monitoring that doesn't wait for human reaction time.

Validated sources

  1. [1]NVD
  2. [2]GitHub Advisory
  3. [3]MITRE