{"api_version":"1","generated_at":"2026-04-23T13:51:57+00:00","cve":"CVE-2026-31454","urls":{"html":"https://cve.report/CVE-2026-31454","api":"https://cve.report/api/cve/CVE-2026-31454.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-31454","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-31454"},"summary":{"title":"xfs: save ailp before dropping the AIL lock in push callbacks","description":"In the Linux kernel, the following vulnerability has been resolved:\n\nxfs: save ailp before dropping the AIL lock in push callbacks\n\nIn xfs_inode_item_push() and xfs_qm_dquot_logitem_push(), the AIL lock\nis dropped to perform buffer IO. Once the cluster buffer no longer\nprotects the log item from reclaim, the log item may be freed by\nbackground reclaim or the dquot shrinker. The subsequent spin_lock()\ncall dereferences lip->li_ailp, which is a use-after-free.\n\nFix this by saving the ailp pointer in a local variable while the AIL\nlock is held and the log item is guaranteed to be valid.","state":"PUBLISHED","assigner":"Linux","published_at":"2026-04-22 14:16:39","updated_at":"2026-04-22 14:16:39"},"problem_types":[],"metrics":[],"references":[{"url":"https://git.kernel.org/stable/c/d8fc60bbaf5aea1604bf9f4ed565da6a1ac7a87d","name":"https://git.kernel.org/stable/c/d8fc60bbaf5aea1604bf9f4ed565da6a1ac7a87d","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/50f5f056807b7bed74f4f307f2ca0ed92f3e556d","name":"https://git.kernel.org/stable/c/50f5f056807b7bed74f4f307f2ca0ed92f3e556d","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/394d70b86fae9fe865e7e6d9540b7696f73aa9b6","name":"https://git.kernel.org/stable/c/394d70b86fae9fe865e7e6d9540b7696f73aa9b6","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/4c7d50147316cf049462f327c4a3e9dc2b7f1dd0","name":"https://git.kernel.org/stable/c/4c7d50147316cf049462f327c4a3e9dc2b7f1dd0","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/edd1637d4e3911ab6c760f553f2040fe72f61a13","name":"https://git.kernel.org/stable/c/edd1637d4e3911ab6c760f553f2040fe72f61a13","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/6dbe17f19c290a72ce57d5abc70e1fad0c3e14e5","name":"https://git.kernel.org/stable/c/6dbe17f19c290a72ce57d5abc70e1fad0c3e14e5","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/75669e987137f49c99ca44406bf0200d1892dd16","name":"https://git.kernel.org/stable/c/75669e987137f49c99ca44406bf0200d1892dd16","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/19437e4f7bb909afde832b39372aa2f3ce3cfd88","name":"https://git.kernel.org/stable/c/19437e4f7bb909afde832b39372aa2f3ce3cfd88","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-31454","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-31454","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 90c60e16401248a4900f3f9387f563d0178dcf34 edd1637d4e3911ab6c760f553f2040fe72f61a13 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 90c60e16401248a4900f3f9387f563d0178dcf34 19437e4f7bb909afde832b39372aa2f3ce3cfd88 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 90c60e16401248a4900f3f9387f563d0178dcf34 6dbe17f19c290a72ce57d5abc70e1fad0c3e14e5 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 90c60e16401248a4900f3f9387f563d0178dcf34 75669e987137f49c99ca44406bf0200d1892dd16 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 90c60e16401248a4900f3f9387f563d0178dcf34 d8fc60bbaf5aea1604bf9f4ed565da6a1ac7a87d git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 90c60e16401248a4900f3f9387f563d0178dcf34 50f5f056807b7bed74f4f307f2ca0ed92f3e556d git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 90c60e16401248a4900f3f9387f563d0178dcf34 4c7d50147316cf049462f327c4a3e9dc2b7f1dd0 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 90c60e16401248a4900f3f9387f563d0178dcf34 394d70b86fae9fe865e7e6d9540b7696f73aa9b6 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 5.9","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.9 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.10.253 5.10.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.15.203 5.15.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.1.168 6.1.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.6.131 6.6.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.12.80 6.12.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.18.21 6.18.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.19.11 6.19.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 7.0 * original_commit_for_fix","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["fs/xfs/xfs_dquot_item.c","fs/xfs/xfs_inode_item.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"edd1637d4e3911ab6c760f553f2040fe72f61a13","status":"affected","version":"90c60e16401248a4900f3f9387f563d0178dcf34","versionType":"git"},{"lessThan":"19437e4f7bb909afde832b39372aa2f3ce3cfd88","status":"affected","version":"90c60e16401248a4900f3f9387f563d0178dcf34","versionType":"git"},{"lessThan":"6dbe17f19c290a72ce57d5abc70e1fad0c3e14e5","status":"affected","version":"90c60e16401248a4900f3f9387f563d0178dcf34","versionType":"git"},{"lessThan":"75669e987137f49c99ca44406bf0200d1892dd16","status":"affected","version":"90c60e16401248a4900f3f9387f563d0178dcf34","versionType":"git"},{"lessThan":"d8fc60bbaf5aea1604bf9f4ed565da6a1ac7a87d","status":"affected","version":"90c60e16401248a4900f3f9387f563d0178dcf34","versionType":"git"},{"lessThan":"50f5f056807b7bed74f4f307f2ca0ed92f3e556d","status":"affected","version":"90c60e16401248a4900f3f9387f563d0178dcf34","versionType":"git"},{"lessThan":"4c7d50147316cf049462f327c4a3e9dc2b7f1dd0","status":"affected","version":"90c60e16401248a4900f3f9387f563d0178dcf34","versionType":"git"},{"lessThan":"394d70b86fae9fe865e7e6d9540b7696f73aa9b6","status":"affected","version":"90c60e16401248a4900f3f9387f563d0178dcf34","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["fs/xfs/xfs_dquot_item.c","fs/xfs/xfs_inode_item.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"5.9"},{"lessThan":"5.9","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"5.10.*","status":"unaffected","version":"5.10.253","versionType":"semver"},{"lessThanOrEqual":"5.15.*","status":"unaffected","version":"5.15.203","versionType":"semver"},{"lessThanOrEqual":"6.1.*","status":"unaffected","version":"6.1.168","versionType":"semver"},{"lessThanOrEqual":"6.6.*","status":"unaffected","version":"6.6.131","versionType":"semver"},{"lessThanOrEqual":"6.12.*","status":"unaffected","version":"6.12.80","versionType":"semver"},{"lessThanOrEqual":"6.18.*","status":"unaffected","version":"6.18.21","versionType":"semver"},{"lessThanOrEqual":"6.19.*","status":"unaffected","version":"6.19.11","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"7.0","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.10.253","versionStartIncluding":"5.9","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.15.203","versionStartIncluding":"5.9","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.1.168","versionStartIncluding":"5.9","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.6.131","versionStartIncluding":"5.9","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.12.80","versionStartIncluding":"5.9","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.18.21","versionStartIncluding":"5.9","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.19.11","versionStartIncluding":"5.9","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0","versionStartIncluding":"5.9","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nxfs: save ailp before dropping the AIL lock in push callbacks\n\nIn xfs_inode_item_push() and xfs_qm_dquot_logitem_push(), the AIL lock\nis dropped to perform buffer IO. Once the cluster buffer no longer\nprotects the log item from reclaim, the log item may be freed by\nbackground reclaim or the dquot shrinker. The subsequent spin_lock()\ncall dereferences lip->li_ailp, which is a use-after-free.\n\nFix this by saving the ailp pointer in a local variable while the AIL\nlock is held and the log item is guaranteed to be valid."}],"providerMetadata":{"dateUpdated":"2026-04-22T13:53:48.242Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/edd1637d4e3911ab6c760f553f2040fe72f61a13"},{"url":"https://git.kernel.org/stable/c/19437e4f7bb909afde832b39372aa2f3ce3cfd88"},{"url":"https://git.kernel.org/stable/c/6dbe17f19c290a72ce57d5abc70e1fad0c3e14e5"},{"url":"https://git.kernel.org/stable/c/75669e987137f49c99ca44406bf0200d1892dd16"},{"url":"https://git.kernel.org/stable/c/d8fc60bbaf5aea1604bf9f4ed565da6a1ac7a87d"},{"url":"https://git.kernel.org/stable/c/50f5f056807b7bed74f4f307f2ca0ed92f3e556d"},{"url":"https://git.kernel.org/stable/c/4c7d50147316cf049462f327c4a3e9dc2b7f1dd0"},{"url":"https://git.kernel.org/stable/c/394d70b86fae9fe865e7e6d9540b7696f73aa9b6"}],"title":"xfs: save ailp before dropping the AIL lock in push callbacks","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2026-31454","datePublished":"2026-04-22T13:53:48.242Z","dateReserved":"2026-03-09T15:48:24.091Z","dateUpdated":"2026-04-22T13:53:48.242Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-22 14:16:39","lastModifiedDate":"2026-04-22 14:16:39","problem_types":[],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"31454","Ordinal":"1","Title":"xfs: save ailp before dropping the AIL lock in push callbacks","CVE":"CVE-2026-31454","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"31454","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\nxfs: save ailp before dropping the AIL lock in push callbacks\n\nIn xfs_inode_item_push() and xfs_qm_dquot_logitem_push(), the AIL lock\nis dropped to perform buffer IO. Once the cluster buffer no longer\nprotects the log item from reclaim, the log item may be freed by\nbackground reclaim or the dquot shrinker. The subsequent spin_lock()\ncall dereferences lip->li_ailp, which is a use-after-free.\n\nFix this by saving the ailp pointer in a local variable while the AIL\nlock is held and the log item is guaranteed to be valid.","Type":"Description","Title":"xfs: save ailp before dropping the AIL lock in push callbacks"}]}}}