Impact
An in‑kernel use‑after‑free occurs in the XFS logging path when the background inode reclaim or dquot shrinker frees a log item while the AIL lock is not held. The tracepoints later dereference the freed pointer, which can corrupt kernel memory or cause a kernel crash. The flaw is captured by CWE‑476 (Use‑After‑Free) and CWE‑825 (Improper Verification of Logical Conditions).
Affected Systems
Any Linux kernel build that contains the vulnerable XFS logging code before the commit referenced in the provided git log identifiers. Exact version numbers are not supplied in the data, so any kernel earlier than the patch commits is potentially affected.
Risk and Exploitability
The CVSS score of 7.8 places the vulnerability in the high‑severity range. The EPSS score is reported as less than 1 %, indicating a low but non‑zero probability of exploitation. Because the flaw is triggered by normal filesystem operations that invoke background reclaim or shrinker processes, it can be exercised by users with access to an affected XFS volume. The vulnerability is not listed in the CISA KEV catalog.
OpenCVE Enrichment
Debian DLA
Debian DSA