xfs: avoid dereferencing log items after push callbacks

Summary

CVECVE-2026-31453
StatePUBLISHED
AssignerLinux
Source PriorityCVE Program / NVD first with legacy fallback
Published2026-04-22 14:16:39 UTC
Updated2026-04-22 14:16:39 UTC
DescriptionIn the Linux kernel, the following vulnerability has been resolved: xfs: avoid dereferencing log items after push callbacks After xfsaild_push_item() calls iop_push(), the log item may have been freed if the AIL lock was dropped during the push. Background inode reclaim or the dquot shrinker can free the log item while the AIL lock is not held, and the tracepoints in the switch statement dereference the log item after iop_push() returns. Fix this by capturing the log item type, flags, and LSN before calling xfsaild_push_item(), and introducing a new xfs_ail_push_class trace event class that takes these pre-captured values and the ailp pointer instead of the log item pointer.

Vendor Declared Affected Products

SourceVendorProductVersionPlatforms
CNA Linux Linux affected 90c60e16401248a4900f3f9387f563d0178dcf34 c8a2ab339b88d10fc34a3318c92f07d8a467019d git Not specified
CNA Linux Linux affected 90c60e16401248a4900f3f9387f563d0178dcf34 7121b22b0bac89394cc4c6a54b5aebc15347bdf5 git Not specified
CNA Linux Linux affected 90c60e16401248a4900f3f9387f563d0178dcf34 c4d603e8e58a3bf35480135ccca2b4f7238abda5 git Not specified
CNA Linux Linux affected 90c60e16401248a4900f3f9387f563d0178dcf34 95fb5d643cc70959baa54cd17f52f80ffc3295e7 git Not specified
CNA Linux Linux affected 90c60e16401248a4900f3f9387f563d0178dcf34 451c6329d9afa45862c36fe6677eb7750db60617 git Not specified
CNA Linux Linux affected 90c60e16401248a4900f3f9387f563d0178dcf34 79ef34ec0554ec04bdbafafbc9836423734e1bd6 git Not specified
CNA Linux Linux affected 5.9 Not specified
CNA Linux Linux unaffected 5.9 semver Not specified
CNA Linux Linux unaffected 6.1.168 6.1.* semver Not specified
CNA Linux Linux unaffected 6.6.131 6.6.* semver Not specified
CNA Linux Linux unaffected 6.12.80 6.12.* semver Not specified
CNA Linux Linux unaffected 6.18.21 6.18.* semver Not specified
CNA Linux Linux unaffected 6.19.11 6.19.* semver Not specified
CNA Linux Linux unaffected 7.0 * original_commit_for_fix Not specified

References

ReferenceSourceLinkTags
git.kernel.org/stable/c/95fb5d643cc70959baa54cd17f52f80ffc3295e7 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/7121b22b0bac89394cc4c6a54b5aebc15347bdf5 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/c4d603e8e58a3bf35480135ccca2b4f7238abda5 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/79ef34ec0554ec04bdbafafbc9836423734e1bd6 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/451c6329d9afa45862c36fe6677eb7750db60617 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/c8a2ab339b88d10fc34a3318c92f07d8a467019d 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report