CVE-2026-31577

In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix NULL i_assoc_inode dereference in nilfs_mdt_save_to_shadow_map The DAT inode's btree node cache (i_assoc_inode) is initialized lazily during btree operations. However, nilfs_mdt_save_to_shadow_map() assumes i_assoc_inode is already initialized when copying dirty pages to the shadow map during GC. If NILFS_IOCTL_CLEAN_SEGMENTS is called immediately after mount before any btree operation has occurred on the DAT inode, i_assoc_inode is NULL leading to a general protection fault. Fix this by calling nilfs_attach_btree_node_cache() on the DAT inode in nilfs_dat_read() at mount time, ensuring i_assoc_inode is always initialized before any GC operation can use it.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

27 Apr 2026, 20:41

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/41de342278ae025c99cc8d33648773f05e306cf1 - () https://git.kernel.org/stable/c/41de342278ae025c99cc8d33648773f05e306cf1 - Patch
References () https://git.kernel.org/stable/c/449ec5fc99f45974525ba9eea16b6670c45cd363 - () https://git.kernel.org/stable/c/449ec5fc99f45974525ba9eea16b6670c45cd363 - Patch
References () https://git.kernel.org/stable/c/4a4e0328edd9e9755843787d28f16dd4165f8b48 - () https://git.kernel.org/stable/c/4a4e0328edd9e9755843787d28f16dd4165f8b48 - Patch
References () https://git.kernel.org/stable/c/7318e3549518ce8f14776a489d86488d80d7e2c8 - () https://git.kernel.org/stable/c/7318e3549518ce8f14776a489d86488d80d7e2c8 - Patch
References () https://git.kernel.org/stable/c/97fb7afec404912d967a7d4715f37742666b3084 - () https://git.kernel.org/stable/c/97fb7afec404912d967a7d4715f37742666b3084 - Patch
References () https://git.kernel.org/stable/c/c36e206f302f1ddefed92d09ecbba070e1ae079e - () https://git.kernel.org/stable/c/c36e206f302f1ddefed92d09ecbba070e1ae079e - Patch
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-476

27 Apr 2026, 14:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/7318e3549518ce8f14776a489d86488d80d7e2c8 -

27 Apr 2026, 12:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/4a4e0328edd9e9755843787d28f16dd4165f8b48 -

24 Apr 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-24 15:16

Updated : 2026-04-27 20:41


NVD link : CVE-2026-31577

Mitre link : CVE-2026-31577

CVE.ORG link : CVE-2026-31577


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference