Improper Check or Handling of Exceptional Conditions in Linux kernel - CVE-2026-23252

 

Improper Check or Handling of Exceptional Conditions in Linux kernel - CVE-2026-23252

Published: March 20, 2026


Vulnerability identifier: #VU124196
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2026-23252
CWE-ID: CWE-703
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Linux Foundation
Affected software:
Linux kernel

Detailed vulnerability description

The vulnerability allows a local user to cause a denial of service.

The vulnerability exists due to improper error handling in the XFS filesystem debugging component when processing internal file descriptor descriptions. A local user can trigger memory allocation failures during descriptor generation to cause a denial of service.

The issue arises because kasprintf calls within the xchk_xfile_*_descr macros may fail when formatting strings larger than 16 bytes, leading to unhandled allocation failures. This can be triggered during XFS filesystem consistency checks. Administrative privileges are not required, but access to XFS debugging interfaces is necessary.


How to mitigate CVE-2026-23252

Install security update from vendor's repository.

Sources