CVE-2026-31702
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
01/05/2026
Last modified:
06/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
f2fs: fix use-after-free of sbi in f2fs_compress_write_end_io()<br />
<br />
In f2fs_compress_write_end_io(), dec_page_count(sbi, type) can bring<br />
the F2FS_WB_CP_DATA counter to zero, unblocking<br />
f2fs_wait_on_all_pages() in f2fs_put_super() on a concurrent unmount<br />
CPU. The unmount path then proceeds to call<br />
f2fs_destroy_page_array_cache(sbi), which destroys<br />
sbi->page_array_slab via kmem_cache_destroy(), and eventually<br />
kfree(sbi). Meanwhile, the bio completion callback is still executing:<br />
when it reaches page_array_free(sbi, ...), it dereferences<br />
sbi->page_array_slab — a destroyed slab cache — to call<br />
kmem_cache_free(), causing a use-after-free.<br />
<br />
This is the same class of bug as CVE-2026-23234 (which fixed the<br />
equivalent race in f2fs_write_end_io() in data.c), but in the<br />
compressed writeback completion path that was not covered by that fix.<br />
<br />
Fix this by moving dec_page_count() to after page_array_free(), so<br />
that all sbi accesses complete before the counter decrement that can<br />
unblock unmount. For non-last folios (where atomic_dec_return on<br />
cic->pending_pages is nonzero), dec_page_count is called immediately<br />
before returning — page_array_free is not reached on this path, so<br />
there is no post-decrement sbi access. For the last folio,<br />
page_array_free runs while the F2FS_WB_CP_DATA counter is still<br />
nonzero (this folio has not yet decremented it), keeping sbi alive,<br />
and dec_page_count runs as the final operation.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.6 (including) | 6.6.136 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.84 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.25 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 7.0.2 (excluding) |
| cpe:2.3:o:linux:linux_kernel:7.1:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.1:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2c97dcb6147c8f7f25c629b93be1e69617de5d4a
- https://git.kernel.org/stable/c/39d4ee19c1e7d753dd655aebee632271b171f43a
- https://git.kernel.org/stable/c/c76cf339b87975ae5b2c06d2d774d5667d25a12a
- https://git.kernel.org/stable/c/ef57cd3329b40c739b9a2e1a8a21ecc4171c6280
- https://git.kernel.org/stable/c/f5154cf3ce1c8193f0c1891d3769f62740cfe6fe



