In the Linux kernel, the following vulnerability has been resolved:
migrate: correct lock ordering for hugetlb file folios
Syzbot has found a deadlock (analyzed by Lance Yang):
1) Task (5749): Holds folio_lock, then tries to acquire i_mmap_rwsem(read lock).
2) Task (5754): Holds i_mmap_rwsem(write lock), then tries to acquire
folio_lock.
migrate_pages()
-> migrate_hugetlbs()
-> unmap_and_move_huge_page() <- Takes folio_lock!
-> remove_migration_ptes()
-> __rmap_walk_file()
-> i_mmap_lock_read() <- Waits for i_mmap_rwsem(read lock)!
hugetlbfs_fallocate()
-> hugetlbfs_punch_hole() <- Takes i_mmap_rwsem(write lock)!
-> hugetlbfs_zero_partial_page()
-> filemap_lock_hugetlb_folio()
-> filemap_lock_folio()
-> __filemap_get_folio <- Waits for folio_lock!
The migration path is the one taking locks in the wrong order according to
the documentation at the top of mm/rmap.c. So expand the scope of the
existing i_mmap_lock to cover the calls to remove_migration_ptes() too.
This is (mostly) how it used to be after commit c0d0381ade79. That was
removed by 336bf30eb765 for both file & anon hugetlb pages when it should
only have been removed for anon hugetlb pages.
References
Configurations
Configuration 1 (hide)
|
History
18 Mar 2026, 12:47
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.10:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.10:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.10:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.10:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.10:rc6:*:*:*:*:*:* |
|
| First Time |
Linux
Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| References | () https://git.kernel.org/stable/c/1b68efce6dd483d22f50d0d3800c4cfda14b1305 - Patch | |
| References | () https://git.kernel.org/stable/c/526394af4e8ade89cacd1a9ce2b97712712fcc34 - Patch | |
| References | () https://git.kernel.org/stable/c/5edb9854f8df5428b40990a1c7d60507da5bd330 - Patch | |
| References | () https://git.kernel.org/stable/c/ad97b9a55246eb940a26ac977f80892a395cabf9 - Patch | |
| References | () https://git.kernel.org/stable/c/b75070823b89009f5123fd0e05a8e0c3d39937c1 - Patch | |
| References | () https://git.kernel.org/stable/c/b7880cb166ab62c2409046b2347261abf701530e - Patch | |
| References | () https://git.kernel.org/stable/c/e7396d23f9d5739f56cf9ab430c3a169f5508394 - Patch | |
| CWE | NVD-CWE-noinfo |
06 Feb 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
04 Feb 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-04 17:16
Updated : 2026-03-18 12:47
NVD link : CVE-2026-23097
Mitre link : CVE-2026-23097
CVE.ORG link : CVE-2026-23097
JSON object : View
Products Affected
linux
- linux_kernel
CWE
