Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-31465

CVE-2026-31465: Linux Kernel Writeback DoS Vulnerability

CVE-2026-31465 is a denial of service flaw in the Linux kernel writeback system that can cause suspend-to-RAM hangs on filesystems without data integrity guarantees. This article covers technical details, impact, and mitigation.

Published: April 23, 2026

CVE-2026-31465 Overview

A vulnerability has been resolved in the Linux kernel's writeback subsystem that could cause system hangs during sync operations on filesystems without data integrity guarantees, particularly affecting FUSE-based filesystems. The issue occurs when sync operations block waiting for flusher threads to complete writeback on filesystems like fuse-overlayfs, which cannot guarantee data persistence.

Critical Impact

This vulnerability can cause suspend-to-RAM hangs and system freezes when sync operations block indefinitely on FUSE filesystems, particularly when the FUSE daemon is frozen or unresponsive.

Affected Products

  • Linux kernel (versions prior to patch)
  • Systems using FUSE-based filesystems (e.g., fuse-overlayfs)
  • Systems utilizing suspend-to-RAM with FUSE mounts

Discovery Timeline

  • 2026-04-22 - CVE CVE-2026-31465 published to NVD
  • 2026-04-23 - Last updated in NVD database

Technical Details for CVE-2026-31465

Vulnerability Analysis

This vulnerability exists in the Linux kernel's writeback mechanism, specifically affecting filesystems that cannot provide data integrity guarantees during sync operations. The core issue stems from the previous implementation where the per-inode AS_NO_DATA_INTEGRITY mapping flag was used to handle filesystems without data persistence guarantees. This approach was fundamentally flawed because data integrity is a filesystem-wide property, not a per-inode characteristic.

When a sync operation is triggered (such as during suspend-to-RAM), the kernel's sync_inodes_sb() function would wait for flusher threads to complete writeback operations. For FUSE filesystems, this waiting behavior becomes problematic in several scenarios: when systemd freezes user session cgroups before invoking kernel suspend (which freezes the FUSE daemon), the kernel's ->write_node() callback issues a synchronous setattr request that cannot be processed since the daemon is frozen.

Additionally, if a FUSE daemon is buggy and cannot properly complete writeback, initiating writeback on a dirty folio already under writeback leads to writeback_get_folio() calling folio_prepare_writeback(), which unconditionally waits for writeback to finish, causing a deadlock condition.

Root Cause

The root cause is the inappropriate placement of the data integrity flag at the inode level rather than the superblock level. The previous implementation using the AS_NO_DATA_INTEGRITY mapping flag (added in commit f9a49aa302a0) caused the kernel to still wait on flusher threads to finish initiating writeback, even though it skipped waiting on writeback completion. This waiting on flusher threads is unnecessary for filesystems without data integrity guarantees and creates the conditions for the observed hangs.

Attack Vector

This is a local denial of service condition that can be triggered under specific circumstances:

  1. A system with FUSE-based filesystems mounted (such as fuse-overlayfs)
  2. Dirty inodes present on the FUSE filesystem
  3. A sync operation triggered (either explicitly or via suspend-to-RAM)
  4. The FUSE daemon being frozen, unresponsive, or buggy

The vulnerability manifests in the wb_wait_for_completion() function within the PM filesystem sync workqueue, as shown in the call trace from the kernel report. The pm_fs_sync_work_fn function triggers sync_inodes_sb() which waits indefinitely for the frozen FUSE daemon to respond.

Detection Methods for CVE-2026-31465

Indicators of Compromise

  • System hangs during suspend-to-RAM operations with FUSE filesystems mounted
  • Kernel tasks stuck in wb_wait_for_completion() visible in stack traces
  • Uninterruptible processes related to pm_fs_sync workqueue operations
  • High wait times in the writeback subsystem when FUSE mounts are active

Detection Strategies

  • Monitor for processes stuck in uninterruptible sleep (D state) with sync_inodes_sb in their stack trace
  • Check dmesg or kernel logs for hung task warnings related to pm_fs_sync_work_fn or writeback operations
  • Use sysrq-t during hangs to capture stack traces and identify writeback-related deadlocks
  • Audit systems for FUSE filesystem mounts that may be affected, particularly fuse-overlayfs configurations

Monitoring Recommendations

  • Implement alerting on kernel hung task warnings, especially those mentioning writeback or sync operations
  • Monitor suspend/resume cycles for failures or extended duration on systems with FUSE mounts
  • Track FUSE daemon health and responsiveness on affected systems
  • Review systemd unit ordering to ensure FUSE daemons are not frozen before kernel suspend sync

How to Mitigate CVE-2026-31465

Immediate Actions Required

  • Apply the kernel patches that introduce the SB_I_NO_DATA_INTEGRITY superblock flag
  • Ensure FUSE daemons are properly ordered in systemd to remain active during suspend operations
  • Consider unmounting FUSE filesystems before suspend if patching is not immediately possible
  • Review and update to the latest stable kernel version containing the fix

Patch Information

The fix introduces a new SB_I_NO_DATA_INTEGRITY superblock flag for filesystems that cannot guarantee data persistence on sync. For superblocks with this flag set, sync operations kick off writeback of dirty inodes but do not wait for the flusher threads to complete. This restores FUSE to its prior behavior before tmp folios were removed, where sync was essentially a no-op for these filesystem types.

Patches are available from the following kernel commits:

  • Kernel Git Commit 5c24a13
  • Kernel Git Commit 76f9377
  • Kernel Git Commit 83800f8

Workarounds

  • Configure systemd to avoid freezing FUSE daemon cgroups before kernel suspend by adjusting FreezerScope settings
  • Unmount FUSE filesystems before initiating suspend-to-RAM operations
  • If possible, avoid using suspend-to-RAM on systems heavily dependent on FUSE filesystems until patched
  • Consider using alternative suspend modes (e.g., hibernate) that may not trigger the same sync behavior

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechLinux Kernel

  • SeverityNONE

  • CVSS ScoreN/A

  • EPSS Probability0.02%

  • Known ExploitedNo
  • Impact Assessment
  • ConfidentialityNone
  • IntegrityNone
  • AvailabilityNone
  • Technical References
  • Kernel Git Commit 5c24a13

  • Kernel Git Commit 76f9377

  • Kernel Git Commit 83800f8
  • Related CVEs
  • CVE-2026-31472: Linux Kernel IPTFS DoS Vulnerability

  • CVE-2026-31451: Linux Kernel ext4 DOS Vulnerability

  • CVE-2026-31448: Linux Kernel ext4 DoS Vulnerability

  • CVE-2026-31437: Linux Kernel DOS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English