CVE-2026-31435
Use-After-Free Vulnerability in Linux Kernel netfs Read Retry
Publication date: 2026-04-22
Last updated on: 2026-04-27
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
This vulnerability in the Linux kernel's netfs subsystem can cause all remaining subrequests from a read request to be abandoned during retry under certain conditions. This may lead to unexpected behavior such as failed read operations or kernel oops (crashes) if the system tries to access an invalid subrequest pointer.
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's netfs component, where during a read request retry, all remaining subrequests can be abandoned incorrectly. The issue arises because the variable 'subreq', which is supposed to indicate where to start abandoning subrequests, may be uninitialized or point to a deleted subrequest. This can cause improper handling of retryable subrequests.
The fix involves setting 'subreq' correctly to the first subrequest expected to need a retry and clearing the pointer after discarding unnecessary retryable subrequests to prevent invalid access.