Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: PM: sleep: Drop spurious WARN_ON() from pm_restore_gfp_mask() Commit 35e4a69b2003f ("PM: sleep: Allow pm_restrict_gfp_mask() stacking") introduced refcount-based GFP mask management that warns when pm_restore_gfp_mask() is called with saved_gfp_count == 0. Some hibernation paths call pm_restore_gfp_mask() defensively where the GFP mask may or may not be restricted depending on the execution path. For example, the uswsusp interface invokes it in SNAPSHOT_CREATE_IMAGE, SNAPSHOT_UNFREEZE, and snapshot_release(). Before the stacking change this was a silent no-op; it now triggers a spurious WARNING. Remove the WARN_ON() wrapper from the !saved_gfp_count check while retaining the check itself, so that defensive calls remain harmless without producing false warnings. [ rjw: Subject tweak ]
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.17.8, < 6.18 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/3025ca5daa9d682b629c0c958b538e41deeb559dPatch
- https://git.kernel.org/stable/c/a8d51efb5929ae308895455a3e496b5eca2cd143Patch
- https://git.kernel.org/stable/c/f19d1323aa3dd7ead469aef47d9085f8939565d9Patch
FAQ
What is CVE-2026-31567?
CVE-2026-31567 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: PM: sleep: Drop spurious WARN_ON() from pm_restore_gfp_mask() Commit 35e4a69b2003f ("PM: sleep: Allow pm_restrict_gfp_mask() stack...
How severe is CVE-2026-31567?
CVE-2026-31567 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-31567?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.