Home

Description

In the Linux kernel, the following vulnerability has been resolved: f2fs: fix use-after-free of sbi in f2fs_compress_write_end_io() In f2fs_compress_write_end_io(), dec_page_count(sbi, type) can bring the F2FS_WB_CP_DATA counter to zero, unblocking f2fs_wait_on_all_pages() in f2fs_put_super() on a concurrent unmount CPU. The unmount path then proceeds to call f2fs_destroy_page_array_cache(sbi), which destroys sbi->page_array_slab via kmem_cache_destroy(), and eventually kfree(sbi). Meanwhile, the bio completion callback is still executing: when it reaches page_array_free(sbi, ...), it dereferences sbi->page_array_slab — a destroyed slab cache — to call kmem_cache_free(), causing a use-after-free. This is the same class of bug as CVE-2026-23234 (which fixed the equivalent race in f2fs_write_end_io() in data.c), but in the compressed writeback completion path that was not covered by that fix. Fix this by moving dec_page_count() to after page_array_free(), so that all sbi accesses complete before the counter decrement that can unblock unmount. For non-last folios (where atomic_dec_return on cic->pending_pages is nonzero), dec_page_count is called immediately before returning — page_array_free is not reached on this path, so there is no post-decrement sbi access. For the last folio, page_array_free runs while the F2FS_WB_CP_DATA counter is still nonzero (this folio has not yet decremented it), keeping sbi alive, and dec_page_count runs as the final operation.

PUBLISHED Reserved 2026-03-09 | Published 2026-05-01 | Updated 2026-05-01 | Assigner Linux

Product status

Default status
unaffected

4c8ff7095bef64fc47e996a938f7d57f9e077da3 (git) before ef57cd3329b40c739b9a2e1a8a21ecc4171c6280
affected

4c8ff7095bef64fc47e996a938f7d57f9e077da3 (git) before f5154cf3ce1c8193f0c1891d3769f62740cfe6fe
affected

4c8ff7095bef64fc47e996a938f7d57f9e077da3 (git) before c76cf339b87975ae5b2c06d2d774d5667d25a12a
affected

4c8ff7095bef64fc47e996a938f7d57f9e077da3 (git) before 2c97dcb6147c8f7f25c629b93be1e69617de5d4a
affected

4c8ff7095bef64fc47e996a938f7d57f9e077da3 (git) before 39d4ee19c1e7d753dd655aebee632271b171f43a
affected

Default status
affected

5.6
affected

Any version before 5.6
unaffected

6.6.136 (semver)
unaffected

6.12.84 (semver)
unaffected

6.18.25 (semver)
unaffected

7.0.2 (semver)
unaffected

7.1-rc1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/ef57cd3329b40c739b9a2e1a8a21ecc4171c6280

git.kernel.org/...c/f5154cf3ce1c8193f0c1891d3769f62740cfe6fe

git.kernel.org/...c/c76cf339b87975ae5b2c06d2d774d5667d25a12a

git.kernel.org/...c/2c97dcb6147c8f7f25c629b93be1e69617de5d4a

git.kernel.org/...c/39d4ee19c1e7d753dd655aebee632271b171f43a

cve.org (CVE-2026-31702)

nvd.nist.gov (CVE-2026-31702)

Download JSON