Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-71107
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-14 Jan, 2026 | 15:05
Updated At-11 May, 2026 | 21:54
Rejected At-
▼CVE Numbering Authority (CNA)
f2fs: ensure node page reads complete before f2fs_put_super() finishes

In the Linux kernel, the following vulnerability has been resolved: f2fs: ensure node page reads complete before f2fs_put_super() finishes Xfstests generic/335, generic/336 sometimes crash with the following message: F2FS-fs (dm-0): detect filesystem reference count leak during umount, type: 9, count: 1 ------------[ cut here ]------------ kernel BUG at fs/f2fs/super.c:1939! Oops: invalid opcode: 0000 [#1] SMP NOPTI CPU: 1 UID: 0 PID: 609351 Comm: umount Tainted: G W 6.17.0-rc5-xfstests-g9dd1835ecda5 #1 PREEMPT(none) Tainted: [W]=WARN Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 RIP: 0010:f2fs_put_super+0x3b3/0x3c0 Call Trace: <TASK> generic_shutdown_super+0x7e/0x190 kill_block_super+0x1a/0x40 kill_f2fs_super+0x9d/0x190 deactivate_locked_super+0x30/0xb0 cleanup_mnt+0xba/0x150 task_work_run+0x5c/0xa0 exit_to_user_mode_loop+0xb7/0xc0 do_syscall_64+0x1ae/0x1c0 entry_SYSCALL_64_after_hwframe+0x76/0x7e </TASK> ---[ end trace 0000000000000000 ]--- It appears that sometimes it is possible that f2fs_put_super() is called before all node page reads are completed. Adding a call to f2fs_wait_on_all_pages() for F2FS_RD_NODE fixes the problem.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/f2fs/super.c
Default Status
unaffected
Versions
Affected
  • From 20872584b8c0b006c007da9588a272c9e28d2e18 before c3031cf2b61f1508662fc95ef9ad505cb0882a5f (git)
  • From 20872584b8c0b006c007da9588a272c9e28d2e18 before 3b15d5f12935e9e25f9a571e680716bc9ee61025 (git)
  • From 20872584b8c0b006c007da9588a272c9e28d2e18 before 0b36fae23621a09e772c8adf918b9011158f8511 (git)
  • From 20872584b8c0b006c007da9588a272c9e28d2e18 before 297baa4aa263ff8f5b3d246ee16a660d76aa82c4 (git)
  • 0e2577074b459bba7f4016f4d725ede37d48bb22 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/f2fs/super.c
Default Status
affected
Versions
Affected
  • 6.5
Unaffected
  • From 0 before 6.5 (semver)
  • From 6.6.120 through 6.6.* (semver)
  • From 6.12.64 through 6.12.* (semver)
  • From 6.18.3 through 6.18.* (semver)
  • From 6.19 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/c3031cf2b61f1508662fc95ef9ad505cb0882a5f
N/A
https://git.kernel.org/stable/c/3b15d5f12935e9e25f9a571e680716bc9ee61025
N/A
https://git.kernel.org/stable/c/0b36fae23621a09e772c8adf918b9011158f8511
N/A
https://git.kernel.org/stable/c/297baa4aa263ff8f5b3d246ee16a660d76aa82c4
N/A
Hyperlink: https://git.kernel.org/stable/c/c3031cf2b61f1508662fc95ef9ad505cb0882a5f
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/3b15d5f12935e9e25f9a571e680716bc9ee61025
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/0b36fae23621a09e772c8adf918b9011158f8511
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/297baa4aa263ff8f5b3d246ee16a660d76aa82c4
Resource: N/A
Details not found