CVE-2026-31586
Gravedad CVSS v3.1:
ALTA
Tipo:
CWE-416
Utilización después de liberación
Fecha de publicación:
24/04/2026
Última modificación:
28/04/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mm: blk-cgroup: fix use-after-free in cgwb_release_workfn()<br />
<br />
cgwb_release_workfn() calls css_put(wb->blkcg_css) and then later accesses<br />
wb->blkcg_css again via blkcg_unpin_online(). If css_put() drops the last<br />
reference, the blkcg can be freed asynchronously (css_free_rwork_fn -><br />
blkcg_css_free -> kfree) before blkcg_unpin_online() dereferences the<br />
pointer to access blkcg->online_pin, resulting in a use-after-free:<br />
<br />
BUG: KASAN: slab-use-after-free in blkcg_unpin_online (./include/linux/instrumented.h:112 ./include/linux/atomic/atomic-instrumented.h:400 ./include/linux/refcount.h:389 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 block/blk-cgroup.c:1367)<br />
Write of size 4 at addr ff11000117aa6160 by task kworker/71:1/531<br />
Workqueue: cgwb_release cgwb_release_workfn<br />
Call Trace:<br />
<br />
blkcg_unpin_online (./include/linux/instrumented.h:112 ./include/linux/atomic/atomic-instrumented.h:400 ./include/linux/refcount.h:389 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 block/blk-cgroup.c:1367)<br />
cgwb_release_workfn (mm/backing-dev.c:629)<br />
process_scheduled_works (kernel/workqueue.c:3278 kernel/workqueue.c:3385)<br />
<br />
Freed by task 1016:<br />
kfree (./include/linux/kasan.h:235 mm/slub.c:2689 mm/slub.c:6246 mm/slub.c:6561)<br />
css_free_rwork_fn (kernel/cgroup/cgroup.c:5542)<br />
process_scheduled_works (kernel/workqueue.c:3302 kernel/workqueue.c:3385)<br />
<br />
** Stack based on commit 66672af7a095 ("Add linux-next specific files<br />
for 20260410")<br />
<br />
I am seeing this crash sporadically in Meta fleet across multiple kernel<br />
versions. A full reproducer is available at:<br />
https://github.com/leitao/debug/blob/main/reproducers/repro_blkcg_uaf.sh<br />
<br />
(The race window is narrow. To make it easily reproducible, inject a<br />
msleep(100) between css_put() and blkcg_unpin_online() in<br />
cgwb_release_workfn(). With that delay and a KASAN-enabled kernel, the<br />
reproducer triggers the splat reliably in less than a second.)<br />
<br />
Fix this by moving blkcg_unpin_online() before css_put(), so the<br />
cgwb&#39;s CSS reference keeps the blkcg alive while blkcg_unpin_online()<br />
accesses it.
Impacto
Puntuación base 3.x
7.80
Gravedad 3.x
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.19 (incluyendo) | 6.6.136 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (incluyendo) | 6.12.83 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (incluyendo) | 6.18.24 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (incluyendo) | 6.19.14 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 7.0 (incluyendo) | 7.0.1 (excluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/115a5266749dcde7fe4127e8623d19c752088f69
- https://git.kernel.org/stable/c/50879a3c1faf06e661090015d59e2127255cff27
- https://git.kernel.org/stable/c/67cb119d32f35e32acd0393bbeb318b2bb1fdafe
- https://git.kernel.org/stable/c/8f5857be99f1ed1fa80991c72449541f634626ee
- https://git.kernel.org/stable/c/dfc8292a1d6782c76b626315605e0585a5a18447
- https://git.kernel.org/stable/c/ea3af09eb87d8f8708c66747fcf1a2762902e839



