๐Ÿ” CVE Alert

CVE-2026-31703

UNKNOWN 0.0

writeback: Fix use after free in inode_switch_wbs_work_fn()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: writeback: Fix use after free in inode_switch_wbs_work_fn() inode_switch_wbs_work_fn() has a loop like: wb_get(new_wb); while (1) { list = llist_del_all(&new_wb->switch_wbs_ctxs); /* Nothing to do? */ if (!list) break; ... process the items ... } Now adding of items to the list looks like: wb_queue_isw() if (llist_add(&isw->list, &wb->switch_wbs_ctxs)) queue_work(isw_wq, &wb->switch_work); Because inode_switch_wbs_work_fn() loops when processing isw items, it can happen that wb->switch_work is pending while wb->switch_wbs_ctxs is empty. This is a problem because in that case wb can get freed (no isw items -> no wb reference) while the work is still pending causing use-after-free issues. We cannot just fix this by cancelling work when freeing wb because that could still trigger problematic 0 -> 1 transitions on wb refcount due to wb_get() in inode_switch_wbs_work_fn(). It could be all handled with more careful code but that seems unnecessarily complex so let's avoid that until it is proven that the looping actually brings practical benefit. Just remove the loop from inode_switch_wbs_work_fn() instead. That way when wb_queue_isw() queues work, we are guaranteed we have added the first item to wb->switch_wbs_ctxs and nobody is going to remove it (and drop the wb reference it holds) until the queued work runs.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 1, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
e1b849cfa6b61f1c866a908c9e8dd9b5aaab820b < 028103656b84273c73e9e271cf95c9f3421f4b8a e1b849cfa6b61f1c866a908c9e8dd9b5aaab820b < 9223e5f30403a9b506d6d0bff4f2e29a2d7d46af e1b849cfa6b61f1c866a908c9e8dd9b5aaab820b < 6689f01d6740cf358932b3e97ee968c6099800d9
Linux / Linux
6.18

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/028103656b84273c73e9e271cf95c9f3421f4b8a git.kernel.org: https://git.kernel.org/stable/c/9223e5f30403a9b506d6d0bff4f2e29a2d7d46af git.kernel.org: https://git.kernel.org/stable/c/6689f01d6740cf358932b3e97ee968c6099800d9