CVE-2026-31446
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
22/04/2026
Last modified:
22/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ext4: fix use-after-free in update_super_work when racing with umount<br />
<br />
Commit b98535d09179 ("ext4: fix bug_on in start_this_handle during umount<br />
filesystem") moved ext4_unregister_sysfs() before flushing s_sb_upd_work<br />
to prevent new error work from being queued via /proc/fs/ext4/xx/mb_groups<br />
reads during unmount. However, this introduced a use-after-free because<br />
update_super_work calls ext4_notify_error_sysfs() -> sysfs_notify() which<br />
accesses the kobject&#39;s kernfs_node after it has been freed by kobject_del()<br />
in ext4_unregister_sysfs():<br />
<br />
update_super_work ext4_put_super<br />
----------------- --------------<br />
ext4_unregister_sysfs(sb)<br />
kobject_del(&sbi->s_kobj)<br />
__kobject_del()<br />
sysfs_remove_dir()<br />
kobj->sd = NULL<br />
sysfs_put(sd)<br />
kernfs_put() // RCU free<br />
ext4_notify_error_sysfs(sbi)<br />
sysfs_notify(&sbi->s_kobj)<br />
kn = kobj->sd // stale pointer<br />
kernfs_get(kn) // UAF on freed kernfs_node<br />
ext4_journal_destroy()<br />
flush_work(&sbi->s_sb_upd_work)<br />
<br />
Instead of reordering the teardown sequence, fix this by making<br />
ext4_notify_error_sysfs() detect that sysfs has already been torn down<br />
by checking s_kobj.state_in_sysfs, and skipping the sysfs_notify() call<br />
in that case. A dedicated mutex (s_error_notify_mutex) serializes<br />
ext4_notify_error_sysfs() against kobject_del() in ext4_unregister_sysfs()<br />
to prevent TOCTOU races where the kobject could be deleted between the<br />
state_in_sysfs check and the sysfs_notify() call.
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/034053378dd81837fd6c7a43b37ee2e58d4f0b4e
- https://git.kernel.org/stable/c/08b10e6f37fc533a759e9833af0692242e8b3f93
- https://git.kernel.org/stable/c/9449f99ba04f5dd1c8423ad8a90b3651d7240d1d
- https://git.kernel.org/stable/c/c4d829737329f2290dd41e290b7d75effdb2a7ff
- https://git.kernel.org/stable/c/c8fe17a1b308c3d8c703ebfb049b325f844342c3
- https://git.kernel.org/stable/c/c97e282f7bfd0c3554c63d289964a5ca6a1d2ffe
- https://git.kernel.org/stable/c/d15e4b0a418537aafa56b2cb80d44add83e83697



