CVE-2026-31567
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
24/04/2026
Last modified:
27/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
PM: sleep: Drop spurious WARN_ON() from pm_restore_gfp_mask()<br />
<br />
Commit 35e4a69b2003f ("PM: sleep: Allow pm_restrict_gfp_mask()<br />
stacking") introduced refcount-based GFP mask management that warns<br />
when pm_restore_gfp_mask() is called with saved_gfp_count == 0.<br />
<br />
Some hibernation paths call pm_restore_gfp_mask() defensively where<br />
the GFP mask may or may not be restricted depending on the execution<br />
path. For example, the uswsusp interface invokes it in<br />
SNAPSHOT_CREATE_IMAGE, SNAPSHOT_UNFREEZE, and snapshot_release().<br />
Before the stacking change this was a silent no-op; it now triggers<br />
a spurious WARNING.<br />
<br />
Remove the WARN_ON() wrapper from the !saved_gfp_count check while<br />
retaining the check itself, so that defensive calls remain harmless<br />
without producing false warnings.<br />
<br />
[ rjw: Subject tweak ]
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.17.8 (including) | 6.18 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.18.1 (including) | 6.18.21 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.18:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



