Cyber Posture

CVE-2026-31598

High

Published: 24 April 2026

Published
24 April 2026
Modified
29 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0006 19.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-31598 is a high-severity Improper Locking (CWE-667) vulnerability in Linux Linux Kernel. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 19.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and RA-5 (Vulnerability Monitoring and Scanning).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely identification, reporting, and patching of the ocfs2 deadlock flaw in the Linux kernel to prevent exploitation.

prevent

Vulnerability scanning detects unpatched kernel versions vulnerable to CVE-2026-31598, enabling proactive remediation.

detect

System monitoring identifies indicators of the deadlock such as hung ocfs2 processes or stalled filesystem operations during exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Remote unauthenticated network exploitation (AV:N) of the ocfs2 kernel deadlock directly enables T1190 for public-facing app compromise and T1499.004 for DoS via application/system exploitation, causing kernel hangs and high availability impact.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix possible deadlock between unlink and dio_end_io_write ocfs2_unlink takes orphan dir inode_lock first and then ip_alloc_sem, while in ocfs2_dio_end_io_write, it acquires these locks in reverse order. This creates an…

more

ABBA lock ordering violation on lock classes ocfs2_sysfile_lock_key[ORPHAN_DIR_SYSTEM_INODE] and ocfs2_file_ip_alloc_sem_key. Lock Chain #0 (orphan dir inode_lock -> ip_alloc_sem): ocfs2_unlink ocfs2_prepare_orphan_dir ocfs2_lookup_lock_orphan_dir inode_lock(orphan_dir_inode) <- lock A __ocfs2_prepare_orphan_dir ocfs2_prepare_dir_for_insert ocfs2_extend_dir ocfs2_expand_inline_dir down_write(&oi->ip_alloc_sem) <- Lock B Lock Chain #1 (ip_alloc_sem -> orphan dir inode_lock): ocfs2_dio_end_io_write down_write(&oi->ip_alloc_sem) <- Lock B ocfs2_del_inode_from_orphan() inode_lock(orphan_dir_inode) <- Lock A Deadlock Scenario: CPU0 (unlink) CPU1 (dio_end_io_write) ------ ------ inode_lock(orphan_dir_inode) down_write(ip_alloc_sem) down_write(ip_alloc_sem) inode_lock(orphan_dir_inode) Since ip_alloc_sem is to protect allocation changes, which is unrelated with operations in ocfs2_del_inode_from_orphan. So move ocfs2_del_inode_from_orphan out of ip_alloc_sem to fix the deadlock.

Deeper analysisAI

CVE-2026-31598 is a deadlock vulnerability in the Linux kernel's ocfs2 filesystem, stemming from an ABBA lock ordering violation between the orphan directory inode_lock and the ip_alloc_sem. In ocfs2_unlink, the locks are acquired in the order of orphan dir inode_lock followed by ip_alloc_sem, while ocfs2_dio_end_io_write acquires them in reverse: ip_alloc_sem first, then orphan dir inode_lock. This can lead to a deadlock when the operations execute concurrently on different CPUs, as detailed in the lock chains provided in the advisory.

A network-accessible, unauthenticated attacker with low attack complexity and no user interaction can exploit this vulnerability remotely (AV:N/AC:L/PR:N/UI:N/S:U), triggering the deadlock scenario. The attacker can cause a denial-of-service condition by inducing concurrent unlink and direct I/O end-write operations on affected ocfs2 volumes, resulting in high availability impact (C:N/I:N/A:H) with a CVSS v3.1 base score of 7.5. Successful exploitation hangs kernel processes involved, disrupting filesystem operations.

Mitigation is addressed in upstream Linux kernel stable releases via patches that reorder lock acquisition by moving ocfs2_del_inode_from_orphan outside the ip_alloc_sem critical section, as ip_alloc_sem protects allocation changes unrelated to orphan directory operations. Relevant commits include 2b884d52273c60c298bd570163e8053657bbaff6, 4b80b5a838a32437f2cae0662578bac216a2c51a, b02da26a992db0c0e2559acbda0fc48d4a2fd337, bc0fb5c7d54c78be43a536df0e20dee32adb27d3, and e049f7a9bd80b7319590789ea5e1c523d6339d91, available in kernel.org stable trees. Security practitioners should update to patched kernel versions using ocfs2.

Details

CWE(s)

Affected Products

linux
linux kernel
4.6 — 6.6.136 · 6.7 — 6.12.83 · 6.13 — 6.18.24

CVEs Like This One

CVE-2026-31467Same product: Linux Linux Kernel
CVE-2026-43029Same product: Linux Linux Kernel
CVE-2026-31667Same product: Linux Linux Kernel
CVE-2026-31486Same product: Linux Linux Kernel
CVE-2026-23419Same product: Linux Linux Kernel
CVE-2026-31476Same product: Linux Linux Kernel
CVE-2026-31706Same product: Linux Linux Kernel
CVE-2026-31711Same product: Linux Linux Kernel
CVE-2026-31631Same product: Linux Linux Kernel
CVE-2024-58087Same product: Linux Linux Kernel

References