#VU124196 Improper Check or Handling of Exceptional Conditions in Linux kernel - CVE-2026-23252

 

#VU124196 Improper Check or Handling of Exceptional Conditions in Linux kernel - CVE-2026-23252

Published: March 20, 2026


Vulnerability identifier: #VU124196
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2026-23252
CWE-ID: CWE-703
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
Linux kernel
Software vendor:
Linux Foundation

Description

The vulnerability allows a local user to cause a denial of service.

The vulnerability exists due to improper error handling in the XFS filesystem debugging component when processing internal file descriptor descriptions. A local user can trigger memory allocation failures during descriptor generation to cause a denial of service.

The issue arises because kasprintf calls within the xchk_xfile_*_descr macros may fail when formatting strings larger than 16 bytes, leading to unhandled allocation failures. This can be triggered during XFS filesystem consistency checks. Administrative privileges are not required, but access to XFS debugging interfaces is necessary.


Remediation

Install security update from vendor's repository.

External links