CVE-2026-23161

Source
https://cve.org/CVERecord?id=CVE-2026-23161
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23161.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-23161
Downstream
Related
Published
2026-02-14T16:01:26.569Z
Modified
2026-04-04T03:00:23.212945Z
Severity
  • 7.3 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H CVSS Calculator
Summary
mm/shmem, swap: fix race of truncate and swap entry split
Details

In the Linux kernel, the following vulnerability has been resolved:

mm/shmem, swap: fix race of truncate and swap entry split

The helper for shmem swap freeing is not handling the order of swap entries correctly. It uses xacmpxchgirq to erase the swap entry, but it gets the entry order before that using xagetorder without lock protection, and it may get an outdated order value if the entry is split or changed in other ways after the xagetorder and before the xacmpxchgirq.

And besides, the order could grow and be larger than expected, and cause truncation to erase data beyond the end border. For example, if the target entry and following entries are swapped in or freed, then a large folio was added in place and swapped out, using the same entry, the xacmpxchgirq will still succeed, it's very unlikely to happen though.

To fix that, open code the Xarray cmpxchg and put the order retrieval and value checking in the same critical section. Also, ensure the order won't exceed the end border, skip it if the entry goes across the border.

Skipping large swap entries crosses the end border is safe here. Shmem truncate iterates the range twice, in the first iteration, findlockentries already filtered such entries, and shmem will swapin the entries that cross the end border and partially truncate the folio (split the folio or at least zero part of it). So in the second loop here, if we see a swap entry that crosses the end order, it must at least have its content erased already.

I observed random swapoff hangs and kernel panics when stress testing ZSWAP with shmem. After applying this patch, all problems are gone.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23161.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
809bc86517cc408b5b8cb8e08e69096639432bc8
Fixed
a99f9a4669a04662c8f9efe0e62cafc598153139
Fixed
b23bee8cdb7aabce5701a7f57414db5a354ae8ed
Fixed
8a1968bd997f45a9b11aefeabdd1232e1b6c7184

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23161.json"