Upstream information
Description
In the Linux kernel, the following vulnerability has been resolved:migrate: correct lock ordering for hugetlb file folios
Syzbot has found a deadlock (analyzed by Lance Yang):
1) Task (5749): Holds folio_lock, then tries to acquire i_mmap_rwsem(read lock).
2) Task (5754): Holds i_mmap_rwsem(write lock), then tries to acquire
folio_lock.
migrate_pages()
-> migrate_hugetlbs()
-> unmap_and_move_huge_page() <- Takes folio_lock!
-> remove_migration_ptes()
-> __rmap_walk_file()
-> i_mmap_lock_read() <- Waits for i_mmap_rwsem(read lock)!
hugetlbfs_fallocate()
-> hugetlbfs_punch_hole() <- Takes i_mmap_rwsem(write lock)!
-> hugetlbfs_zero_partial_page()
-> filemap_lock_hugetlb_folio()
-> filemap_lock_folio()
-> __filemap_get_folio <- Waits for folio_lock!
The migration path is the one taking locks in the wrong order according to
the documentation at the top of mm/rmap.c. So expand the scope of the
existing i_mmap_lock to cover the calls to remove_migration_ptes() too.
This is (mostly) how it used to be after commit c0d0381ade79. That was
removed by 336bf30eb765 for both file & anon hugetlb pages when it should
only have been removed for anon hugetlb pages.
SUSE information
Overall state of this security issue: Does not affect SUSE products
Note from the SUSE Security Team on the kernel-default package
SUSE will no longer fix all CVEs in the Linux Kernel anymore, but declare some bug classes as won't fix. Please refer to TID 21496 for more details. SUSE Bugzilla entry: 1257815 [IN_PROGRESS]SUSE Security Advisories:
- RHSA-2026:3464, published Mon Mar 2 16:07:53 UTC 2026
- RHSA-2026:3488, published Fri Apr 10 15:10:29 UTC 2026
- RHSA-2026:4012, published Sat Apr 18 15:11:58 UTC 2026
- SUSE-SU-2026:20838-1, published 2026-03-25T08:52:20Z
- SUSE-SU-2026:20873-1, published 2026-03-25T08:43:53Z
- SUSE-SU-2026:20931-1, published 2026-03-25T08:49:52Z
- SUSE-SU-2026:21284-1, published 2026-04-22T11:14:23Z
List of released packages
| Product(s) | Fixed package version(s) | References |
|---|---|---|
| Container suse/sl-micro/6.1/baremetal-os-container:2.2.1-7.67 Container suse/sl-micro/6.1/base-os-container:2.2.1-5.89 Container suse/sl-micro/6.1/kvm-os-container:2.2.1-5.92 Container suse/sl-micro/6.1/rt-os-container:2.2.1-5.81 |
| |
| Image SL-Micro-Azure Image SL-Micro-BYOS-Azure Image SL-Micro-BYOS-EC2 Image SL-Micro-BYOS-GCE Image SL-Micro-EC2 Image SUSE-Multi-Linux-Manager-Proxy-BYOS-Azure Image SUSE-Multi-Linux-Manager-Proxy-BYOS-EC2 Image SUSE-Multi-Linux-Manager-Proxy-BYOS-GCE Image SUSE-Multi-Linux-Manager-Server-Azure-llc Image SUSE-Multi-Linux-Manager-Server-Azure-ltd Image SUSE-Multi-Linux-Manager-Server-BYOS-Azure Image SUSE-Multi-Linux-Manager-Server-BYOS-EC2 Image SUSE-Multi-Linux-Manager-Server-BYOS-GCE Image SUSE-Multi-Linux-Manager-Server-EC2-llc Image SUSE-Multi-Linux-Manager-Server-EC2-ltd |
| |
| Image SLES-Azure-3P Image SLES-Azure-Basic Image SLES-Azure-Standard Image SLES-BYOS-Azure Image SLES-BYOS-EC2 Image SLES-BYOS-GCE Image SLES-CHOST-BYOS-GDC Image SLES-CHOST-BYOS-SAP-CCloud Image SLES-EC2 Image SLES-GCE Image SLES-GCE-3P Image SLES-Hardened-BYOS-Azure Image SLES-Hardened-BYOS-EC2 Image SLES-Hardened-BYOS-GCE Image SLES-SAPCAL-Azure Image SLES-SAPCAL-EC2 Image SLES-SAPCAL-GCE |
| |
| Image SLES-SAP-Azure Image SLES-SAP-Azure-3P Image SLES-SAP-BYOS-Azure Image SLES-SAP-BYOS-EC2 Image SLES-SAP-BYOS-GCE Image SLES-SAP-EC2 Image SLES-SAP-GCE Image SLES-SAP-GCE-3P |
| |
| SUSE Liberty Linux 10 |
| Patchnames: RHSA-2026:4012 |
| SUSE Liberty Linux 8 |
| Patchnames: RHSA-2026:3464 |
| SUSE Liberty Linux 9 |
| Patchnames: RHSA-2026:3488 |
| SUSE Linux Enterprise High Availability Extension 16.0 |
| Patchnames: SUSE-SLES-HA-16.0-435 |
| SUSE Linux Enterprise Server 16.0 |
| Patchnames: SUSE-SLES-16.0-435 |
| SUSE Linux Enterprise Server for SAP applications 16.0 |
| Patchnames: SUSE-SLES-16.0-435 |
| SUSE Linux Micro 6.2 |
| Patchnames: SUSE-SL-Micro-6.2-435 |
| openSUSE Leap 16.0 |
| Patchnames: openSUSE-Leap-16.0-435 |
List of packages in QA
| Product(s) | Package(s) |
|---|---|
| SUSE Linux Enterprise Server 16.0 |
|
Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification. The updates are grouped by state of their lifecycle. SUSE product lifecycles are documented on the lifecycle page.
| Product(s) | Source package | State |
|---|---|---|
| Products under general support and receiving all security fixes. | ||
| SUSE Linux Enterprise High Availability Extension 16.0 | kernel-default | Released |
| SUSE Linux Enterprise Server 16.0 | kernel-64kb | In progress |
| SUSE Linux Enterprise Server 16.0 | kernel-azure | In progress |
| SUSE Linux Enterprise Server 16.0 | kernel-default | In progress |
| SUSE Linux Enterprise Server 16.0 | kernel-default-base | In progress |
| SUSE Linux Enterprise Server 16.0 | kernel-docs | In progress |
| SUSE Linux Enterprise Server 16.0 | kernel-kvmsmall | In progress |
| SUSE Linux Enterprise Server 16.0 | kernel-obs-qa | In progress |
| SUSE Linux Enterprise Server 16.0 | kernel-source | In progress |
| SUSE Linux Enterprise Server 16.0 | kernel-syms | In progress |
| SUSE Linux Enterprise Server 16.0 | kernel-zfcpdump | In progress |
| SUSE Linux Enterprise Server for SAP applications 16.0 | kernel-azure | Released |
| SUSE Linux Enterprise Server for SAP applications 16.0 | kernel-default | Released |
| SUSE Linux Enterprise Server for SAP applications 16.0 | kernel-default-base | Released |
| SUSE Linux Enterprise Server for SAP applications 16.0 | kernel-docs | Released |
| SUSE Linux Enterprise Server for SAP applications 16.0 | kernel-kvmsmall | Released |
| SUSE Linux Enterprise Server for SAP applications 16.0 | kernel-obs-qa | Released |
| SUSE Linux Enterprise Server for SAP applications 16.0 | kernel-source | Released |
| SUSE Linux Enterprise Server for SAP applications 16.0 | kernel-syms | Released |
| SUSE Linux Micro 6.2 | kernel-64kb | Released |
| SUSE Linux Micro 6.2 | kernel-default | Released |
| SUSE Linux Micro 6.2 | kernel-default-base | Released |
| SUSE Linux Micro 6.2 | kernel-rt | Released |
| SUSE Linux Micro 6.2 | kernel-source | Released |
SUSE Timeline for this CVE
CVE page created: Wed Feb 4 20:04:48 2026CVE page last modified: Fri May 8 12:01:15 2026