CVE-2026-31580

In the Linux kernel, the following vulnerability has been resolved: bcache: fix cached_dev.sb_bio use-after-free and crash In our production environment, we have received multiple crash reports regarding libceph, which have caught our attention: ``` [6888366.280350] Call Trace: [6888366.280452] blk_update_request+0x14e/0x370 [6888366.280561] blk_mq_end_request+0x1a/0x130 [6888366.280671] rbd_img_handle_request+0x1a0/0x1b0 [rbd] [6888366.280792] rbd_obj_handle_request+0x32/0x40 [rbd] [6888366.280903] __complete_request+0x22/0x70 [libceph] [6888366.281032] osd_dispatch+0x15e/0xb40 [libceph] [6888366.281164] ? inet_recvmsg+0x5b/0xd0 [6888366.281272] ? ceph_tcp_recvmsg+0x6f/0xa0 [libceph] [6888366.281405] ceph_con_process_message+0x79/0x140 [libceph] [6888366.281534] ceph_con_v1_try_read+0x5d7/0xf30 [libceph] [6888366.281661] ceph_con_workfn+0x329/0x680 [libceph] ``` After analyzing the coredump file, we found that the address of dc->sb_bio has been freed. We know that cached_dev is only freed when it is stopped. Since sb_bio is a part of struct cached_dev, rather than an alloc every time. If the device is stopped while writing to the superblock, the released address will be accessed at endio. This patch hopes to wait for sb_write to complete in cached_dev_free. It should be noted that we analyzed the cause of the problem, then tell all details to the QWEN and adopted the modifications it made.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

27 Apr 2026, 20:29

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/2d6965581e164fa2ba3f7652ddae5535f6336576 - () https://git.kernel.org/stable/c/2d6965581e164fa2ba3f7652ddae5535f6336576 - Patch
References () https://git.kernel.org/stable/c/383f7fec0de8cee1cf7ae1f9d9f14044a61f10f9 - () https://git.kernel.org/stable/c/383f7fec0de8cee1cf7ae1f9d9f14044a61f10f9 - Patch
References () https://git.kernel.org/stable/c/47fa09fe7f3e09df28a51cb2cbd8f5d2f7f6edc1 - () https://git.kernel.org/stable/c/47fa09fe7f3e09df28a51cb2cbd8f5d2f7f6edc1 - Patch
References () https://git.kernel.org/stable/c/4f71c8ba2dc009042493021d94a9718fbe2ebf27 - () https://git.kernel.org/stable/c/4f71c8ba2dc009042493021d94a9718fbe2ebf27 - Patch
References () https://git.kernel.org/stable/c/add4982510f3b7c318a2dd7438bdc9c63171e753 - () https://git.kernel.org/stable/c/add4982510f3b7c318a2dd7438bdc9c63171e753 - Patch
References () https://git.kernel.org/stable/c/fec114a98b8735ee89c75216c45a78e28be0f128 - () https://git.kernel.org/stable/c/fec114a98b8735ee89c75216c45a78e28be0f128 - Patch
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-416
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

27 Apr 2026, 14:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/47fa09fe7f3e09df28a51cb2cbd8f5d2f7f6edc1 -

27 Apr 2026, 12:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/fec114a98b8735ee89c75216c45a78e28be0f128 -

24 Apr 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-24 15:16

Updated : 2026-04-27 20:29


NVD link : CVE-2026-31580

Mitre link : CVE-2026-31580

CVE.ORG link : CVE-2026-31580


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free