U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2026-31455 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: xfs: stop reclaim before pushing AIL during unmount The unmount sequence in xfs_unmount_flush_inodes() pushed the AIL while background reclaim and inodegc are still running. This is broken independently of any use-after-free issues - background reclaim and inodegc should not be running while the AIL is being pushed during unmount, as inodegc can dirty and insert inodes into the AIL during the flush, and background reclaim can race to abort and free dirty inodes. Reorder xfs_unmount_flush_inodes() to stop inodegc and cancel background reclaim before pushing the AIL. Stop inodegc before cancelling m_reclaim_work because the inodegc worker can re-queue m_reclaim_work via xfs_inodegc_set_reclaimable.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/239d734c00644072862fa833805c4471573b1445 kernel.org
https://git.kernel.org/stable/c/4f24a767e3d64a5f58c595b5c29b6063a201f1e3 kernel.org
https://git.kernel.org/stable/c/558e3275d8a3b101be18a7fe7d1634053e9d9b07 kernel.org
https://git.kernel.org/stable/c/8147e304d7d32fd5c3e943babc296ce2873dc279 kernel.org
https://git.kernel.org/stable/c/a89434a6188d8430ea31120da96e3e4cefb58686 kernel.org
https://git.kernel.org/stable/c/bda27fc0b4eb3a425d9a18475c4cb94fbe862c60 kernel.org
https://git.kernel.org/stable/c/d38135af04a3ad8a585c899d176efc8e97853115 kernel.org
https://git.kernel.org/stable/c/e6cc490048f78b009259a5f032acead9f789c34c kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2026-31455
NVD Published Date:
04/22/2026
NVD Last Modified:
04/22/2026
Source:
kernel.org