A Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. Five years running.A Leader in the Gartner® Magic Quadrant™Read the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI Security Portfolio
      Leading the Way in AI-Powered Security Solutions
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly ingest data from on-prem, cloud or hybrid environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Identity Security
    • Singularity Identity
      Identity Threat Detection and Response
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-class Expertise and Threat Intelligence.
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      Digital Forensics, IRR & Breach Readiness
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive solutions for seamless security operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • Partner Locator
      Your go-to source for our top partners in your region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-71105

CVE-2025-71105: Linux Kernel Slab Cache Vulnerability

CVE-2025-71105 is a slab cache naming conflict in the Linux kernel's f2fs filesystem that causes warnings during mount operations. This post covers the technical details, affected versions, impact, and mitigation strategies.

Published: January 23, 2026

CVE-2025-71105 Overview

A vulnerability has been identified in the Linux kernel's f2fs (Flash-Friendly File System) module related to improper handling of slab cache naming. The issue occurs when creating per-superblock slab caches for extended attributes (inline_xattr_slab), which can result in kernel warnings and potential system instability when multiple f2fs filesystems are mounted with conflicting slab cache names.

Critical Impact

This vulnerability can cause kernel warnings and potential denial of service conditions when remounting f2fs filesystems, as the slab cache system encounters duplicate cache name conflicts during filesystem operations.

Affected Products

  • Linux kernel versions with f2fs module support
  • Systems using f2fs filesystem with extended attributes enabled
  • Linux kernel prior to patches across stable branches

Discovery Timeline

  • January 14, 2026 - CVE-2025-71105 published to NVD
  • January 19, 2026 - Last updated in NVD database

Technical Details for CVE-2025-71105

Vulnerability Analysis

The vulnerability exists in the f2fs filesystem's handling of slab cache creation for extended attribute (xattr) entries. When multiple f2fs filesystems are mounted, each superblock attempts to create its own slab cache with a name based on the device's major:minor numbers (e.g., f2fs_xattr_entry-7:7).

The issue arises from how the kernel's slab allocator handles caches with identical sizes. When two slab caches are created with the same size but different names, the slab system optimizes by sharing the underlying cache structure, using the first cache's name. This creates a reference-counted shared structure rather than two separate caches.

The problem manifests when the first cache is destroyed (e.g., during unmount). The slab system only decrements the reference count rather than fully releasing the cache. Subsequently, when attempting to remount the filesystem and recreate a cache with the original name, the kernel's kmem_cache_sanity_check() function detects the name collision with the still-existing (shared) cache structure and triggers a kernel warning.

Root Cause

The root cause is the use of per-superblock slab cache naming for f2fs_xattr_entry structures. When multiple filesystems create caches with the same slab object size, the kernel's slab merging optimization causes name collisions during the mount/unmount cycle. The function f2fs_init_xattr_caches() in fs/f2fs/xattr.c creates these per-superblock caches, leading to the collision when cache names are reused after reference count manipulation.

Attack Vector

The vulnerability can be triggered through a sequence of filesystem mount operations:

  1. Mount a first f2fs filesystem (creates slab cache f2fs_xattr_entry-7:3)
  2. Mount a second f2fs filesystem with similar xattr configuration (creates f2fs_xattr_entry-7:7, but shares underlying cache)
  3. Unmount the first filesystem (decrements reference count but cache persists)
  4. Remount the first filesystem (attempts to create f2fs_xattr_entry-7:3 again, triggering the warning)

The attack sequence involves standard mount operations that can trigger kernel warnings at mm/slab_common.c:110 in kmem_cache_sanity_check(), potentially causing system instability or denial of service through repeated warnings.

Detection Methods for CVE-2025-71105

Indicators of Compromise

  • Kernel warnings containing kmem_cache of name 'f2fs_xattr_entry-*' already exists
  • Warning messages at mm/slab_common.c:110 in kmem_cache_sanity_check function
  • Call traces showing f2fs_init_xattr_caches followed by f2fs_fill_super during mount operations

Detection Strategies

  • Monitor kernel logs (dmesg) for kmem_cache_sanity_check warnings related to f2fs
  • Enable kernel warning tracking for __kmem_cache_create_args failures
  • Implement alerting for repeated f2fs mount/unmount cycles that produce slab cache warnings

Monitoring Recommendations

  • Configure syslog monitoring for f2fs-related kernel warnings
  • Track mount/unmount patterns for f2fs filesystems to identify potential trigger conditions
  • Monitor system stability metrics when multiple f2fs filesystems are in use

How to Mitigate CVE-2025-71105

Immediate Actions Required

  • Update to a patched Linux kernel version containing the fix
  • Review systems with multiple f2fs mounted filesystems for potential exposure
  • Consider temporarily limiting f2fs mount/unmount cycles on affected systems until patching is complete

Patch Information

The fix addresses this vulnerability by using a global inline_xattr_slab cache instead of per-superblock slab caches. This eliminates the name collision issue by sharing a single, properly managed cache across all f2fs superblocks.

Multiple kernel patches are available across stable branches:

  • Kernel Patch 1eb0b130196b
  • Kernel Patch 1f27ef42bb0b
  • Kernel Patch 474cc3ed3743
  • Kernel Patch 72ce19dfed16
  • Kernel Patch 93d30fe19660
  • Kernel Patch be4c3a3c6c23
  • Kernel Patch e6d828eae00e

Workarounds

  • Avoid rapid mount/unmount cycles of multiple f2fs filesystems on the same system
  • Consider using alternative filesystems temporarily if f2fs mount operations are causing instability
  • Monitor for kernel warnings and restart affected services if warnings occur

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeOther

  • Vendor/TechLinux Kernel

  • SeverityNONE

  • CVSS ScoreN/A

  • EPSS Probability0.03%

  • Known ExploitedNo
  • Impact Assessment
  • ConfidentialityNone
  • IntegrityNone
  • AvailabilityNone
  • Technical References
  • Kernel Patch 1eb0b130196b

  • Kernel Patch 1f27ef42bb0b

  • Kernel Patch 474cc3ed3743

  • Kernel Patch 72ce19dfed16

  • Kernel Patch 93d30fe19660

  • Kernel Patch be4c3a3c6c23

  • Kernel Patch e6d828eae00e
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • English
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use