Home

Description

In the Linux kernel, the following vulnerability has been resolved: tracing: Drain deferred trigger frees if kthread creation fails Boot-time trigger registration can fail before the trigger-data cleanup kthread exists. Deferring those frees until late init is fine, but the post-boot fallback must still drain the deferred list if kthread creation never succeeds. Otherwise, boot-deferred nodes can accumulate on trigger_data_free_list, later frees fall back to synchronously freeing only the current object, and the older queued entries are leaked forever. To trigger this, add the following to the kernel command line: trace_event=sched_switch trace_trigger=sched_switch.traceon,sched_switch.traceon The second traceon trigger will fail and be freed. This triggers a NULL pointer dereference and crashes the kernel. Keep the deferred boot-time behavior, but when kthread creation fails, drain the whole queued list synchronously. Do the same in the late-init drain path so queued entries are not stranded there either.

PUBLISHED Reserved 2026-03-09 | Published 2026-04-22 | Updated 2026-04-22 | Assigner Linux

Product status

Default status
unaffected

61d445af0a7c70018111919e47beaaee15653f2f (git) before 771624b7884a83bb9f922ae64ee41a5f8b7576c9
affected

61d445af0a7c70018111919e47beaaee15653f2f (git) before 250ab25391edeeab8462b68be42e4904506c409c
affected

Default status
affected

6.19
affected

Any version before 6.19
unaffected

6.19.11 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/771624b7884a83bb9f922ae64ee41a5f8b7576c9

git.kernel.org/...c/250ab25391edeeab8462b68be42e4904506c409c

cve.org (CVE-2026-31481)

nvd.nist.gov (CVE-2026-31481)

Download JSON