CVE-2026-31467
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
22/04/2026
Última modificación:
23/04/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
erofs: add GFP_NOIO in the bio completion if needed<br />
<br />
The bio completion path in the process context (e.g. dm-verity)<br />
will directly call into decompression rather than trigger another<br />
workqueue context for minimal scheduling latencies, which can<br />
then call vm_map_ram() with GFP_KERNEL.<br />
<br />
Due to insufficient memory, vm_map_ram() may generate memory<br />
swapping I/O, which can cause submit_bio_wait to deadlock<br />
in some scenarios.<br />
<br />
Trimmed down the call stack, as follows:<br />
<br />
f2fs_submit_read_io<br />
submit_bio //bio_list is initialized.<br />
mmc_blk_mq_recovery<br />
z_erofs_endio<br />
vm_map_ram<br />
__pte_alloc_kernel<br />
__alloc_pages_direct_reclaim<br />
shrink_folio_list<br />
__swap_writepage<br />
submit_bio_wait //bio_list is non-NULL, hang!!!<br />
<br />
Use memalloc_noio_{save,restore}() to wrap up this path.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/378949f46e897204384f3f5f91e42e93e3f87568
- https://git.kernel.org/stable/c/5c8ecdcfbfb0b0c6a82a4ebadc1ddea61609b902
- https://git.kernel.org/stable/c/c23df30915f83e7257c8625b690a1cece94142a0
- https://git.kernel.org/stable/c/d6565ea662e17d45a577184b0011bd69de22dc2b
- https://git.kernel.org/stable/c/d9d8360cb66e3b599d89d2526e7da8b530ebf2ff
- https://git.kernel.org/stable/c/da40464064599eefe78749f75cd2bba371044c04
- https://git.kernel.org/stable/c/e83e20b82859f0588e9a52a6fa9fea704a2061cf



