nilfs2: fix NULL i_assoc_inode dereference in nilfs_mdt_save_to_shadow_map
Summary
| CVE | CVE-2026-31577 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-24 15:16:32 UTC |
| Updated | 2026-04-27 20:41:46 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix NULL i_assoc_inode dereference in nilfs_mdt_save_to_shadow_map The DAT inode's btree node cache (i_assoc_inode) is initialized lazily during btree operations. However, nilfs_mdt_save_to_shadow_map() assumes i_assoc_inode is already initialized when copying dirty pages to the shadow map during GC. If NILFS_IOCTL_CLEAN_SEGMENTS is called immediately after mount before any btree operation has occurred on the DAT inode, i_assoc_inode is NULL leading to a general protection fault. Fix this by calling nilfs_attach_btree_node_cache() on the DAT inode in nilfs_dat_read() at mount time, ensuring i_assoc_inode is always initialized before any GC operation can use it. |
Risk And Classification
Primary CVSS: v3.1 5.5 MEDIUM from [email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
EPSS: 0.000180000 probability, percentile 0.048130000 (date 2026-04-27)
Problem Types: CWE-476
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
NoneIntegrity
NoneAvailability
HighCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Linux | Linux Kernel | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected e897be17a441fa637cd166fc3de1445131e57692 7318e3549518ce8f14776a489d86488d80d7e2c8 git | Not specified |
| CNA | Linux | Linux | affected e897be17a441fa637cd166fc3de1445131e57692 449ec5fc99f45974525ba9eea16b6670c45cd363 git | Not specified |
| CNA | Linux | Linux | affected e897be17a441fa637cd166fc3de1445131e57692 c36e206f302f1ddefed92d09ecbba070e1ae079e git | Not specified |
| CNA | Linux | Linux | affected e897be17a441fa637cd166fc3de1445131e57692 41de342278ae025c99cc8d33648773f05e306cf1 git | Not specified |
| CNA | Linux | Linux | affected e897be17a441fa637cd166fc3de1445131e57692 97fb7afec404912d967a7d4715f37742666b3084 git | Not specified |
| CNA | Linux | Linux | affected e897be17a441fa637cd166fc3de1445131e57692 4a4e0328edd9e9755843787d28f16dd4165f8b48 git | Not specified |
| CNA | Linux | Linux | affected 6c3da8c0a35bbafe359d9166269d5590f29664de git | Not specified |
| CNA | Linux | Linux | affected 605babb979c213737618b1c837e89624e5ab11fd git | Not specified |
| CNA | Linux | Linux | affected 307d021b1a7f33048b624f7aaeaa75e3eae571f1 git | Not specified |
| CNA | Linux | Linux | affected d626fcdabea2258be395a775bdbe09270e9bf73d git | Not specified |
| CNA | Linux | Linux | affected d05cc5395e36711edad8bdef6945f138d8a7097b git | Not specified |
| CNA | Linux | Linux | affected 1829b24a36ca12ca95b96d5478faeff40c17f2b6 git | Not specified |
| CNA | Linux | Linux | affected 5.18 | Not specified |
| CNA | Linux | Linux | unaffected 5.18 semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.136 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.83 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.24 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.14 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0.1 7.0.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.1-rc1 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/c36e206f302f1ddefed92d09ecbba070e1ae079e | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/449ec5fc99f45974525ba9eea16b6670c45cd363 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/7318e3549518ce8f14776a489d86488d80d7e2c8 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/97fb7afec404912d967a7d4715f37742666b3084 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/4a4e0328edd9e9755843787d28f16dd4165f8b48 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/41de342278ae025c99cc8d33648773f05e306cf1 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.