CVE-2026-31598

HIGH

ocfs2: fix possible deadlock between unlink and dio_end_io_write

Title source: cna
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix possible deadlock between unlink and dio_end_io_write ocfs2_unlink takes orphan dir inode_lock first and then ip_alloc_sem, while in ocfs2_dio_end_io_write, it acquires these locks in reverse order. This creates an ABBA lock ordering violation on lock classes ocfs2_sysfile_lock_key[ORPHAN_DIR_SYSTEM_INODE] and ocfs2_file_ip_alloc_sem_key. Lock Chain #0 (orphan dir inode_lock -> ip_alloc_sem): ocfs2_unlink ocfs2_prepare_orphan_dir ocfs2_lookup_lock_orphan_dir inode_lock(orphan_dir_inode) <- lock A __ocfs2_prepare_orphan_dir ocfs2_prepare_dir_for_insert ocfs2_extend_dir ocfs2_expand_inline_dir down_write(&oi->ip_alloc_sem) <- Lock B Lock Chain #1 (ip_alloc_sem -> orphan dir inode_lock): ocfs2_dio_end_io_write down_write(&oi->ip_alloc_sem) <- Lock B ocfs2_del_inode_from_orphan() inode_lock(orphan_dir_inode) <- Lock A Deadlock Scenario: CPU0 (unlink) CPU1 (dio_end_io_write) ------ ------ inode_lock(orphan_dir_inode) down_write(ip_alloc_sem) down_write(ip_alloc_sem) inode_lock(orphan_dir_inode) Since ip_alloc_sem is to protect allocation changes, which is unrelated with operations in ocfs2_del_inode_from_orphan. So move ocfs2_del_inode_from_orphan out of ip_alloc_sem to fix the deadlock.

Scores

CVSS v3 7.5
EPSS 0.0006
EPSS Percentile 19.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-667
Status published
Products (19)
Linux/Linux < 4.6
Linux/Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 2b884d52273c60c298bd570163e8053657bbaff6
Linux/Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - bc0fb5c7d54c78be43a536df0e20dee32adb27d3
Linux/Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - e049f7a9bd80b7319590789ea5e1c523d6339d91
Linux/Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - f9fb1a7b635849322e1d7b7b6b26389778ec8e82
Linux/Linux 4.6
Linux/Linux 6.12.83 - 6.12.*
Linux/Linux 6.18.24 - 6.18.*
Linux/Linux 6.19.14 - 6.19.*
Linux/Linux 6.6.136 - 6.6.*
... and 9 more
Published Apr 24, 2026
Tracked Since Apr 24, 2026