xfs: avoid dereferencing log items after push callbacks
Summary
| CVE | CVE-2026-31453 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-22 14:16:39 UTC |
| Updated | 2026-04-22 14:16:39 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
xfs: avoid dereferencing log items after push callbacks
After xfsaild_push_item() calls iop_push(), the log item may have been
freed if the AIL lock was dropped during the push. Background inode
reclaim or the dquot shrinker can free the log item while the AIL lock
is not held, and the tracepoints in the switch statement dereference
the log item after iop_push() returns.
Fix this by capturing the log item type, flags, and LSN before calling
xfsaild_push_item(), and introducing a new xfs_ail_push_class trace
event class that takes these pre-captured values and the ailp pointer
instead of the log item pointer. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected 90c60e16401248a4900f3f9387f563d0178dcf34 c8a2ab339b88d10fc34a3318c92f07d8a467019d git |
Not specified |
| CNA |
Linux |
Linux |
affected 90c60e16401248a4900f3f9387f563d0178dcf34 7121b22b0bac89394cc4c6a54b5aebc15347bdf5 git |
Not specified |
| CNA |
Linux |
Linux |
affected 90c60e16401248a4900f3f9387f563d0178dcf34 c4d603e8e58a3bf35480135ccca2b4f7238abda5 git |
Not specified |
| CNA |
Linux |
Linux |
affected 90c60e16401248a4900f3f9387f563d0178dcf34 95fb5d643cc70959baa54cd17f52f80ffc3295e7 git |
Not specified |
| CNA |
Linux |
Linux |
affected 90c60e16401248a4900f3f9387f563d0178dcf34 451c6329d9afa45862c36fe6677eb7750db60617 git |
Not specified |
| CNA |
Linux |
Linux |
affected 90c60e16401248a4900f3f9387f563d0178dcf34 79ef34ec0554ec04bdbafafbc9836423734e1bd6 git |
Not specified |
| CNA |
Linux |
Linux |
affected 5.9 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.9 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.1.168 6.1.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.6.131 6.6.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12.80 6.12.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.21 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.11 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/95fb5d643cc70959baa54cd17f52f80ffc3295e7 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/7121b22b0bac89394cc4c6a54b5aebc15347bdf5 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/c4d603e8e58a3bf35480135ccca2b4f7238abda5 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/79ef34ec0554ec04bdbafafbc9836423734e1bd6 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/451c6329d9afa45862c36fe6677eb7750db60617 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/c8a2ab339b88d10fc34a3318c92f07d8a467019d |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.