Detection of error condition without action in Linux kernel - CVE-2026-23250

 

Detection of error condition without action in Linux kernel - CVE-2026-23250

Published: March 20, 2026


Vulnerability identifier: #VU124198
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2026-23250
CWE-ID: CWE-390
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Linux Foundation
Affected software:
Linux kernel

Detailed vulnerability description

The vulnerability allows a local user to cause a denial of service.

The vulnerability exists due to improper error handling in the XFS filesystem's xchk_scrub_create_subord function when processing scrub operations. A local user can trigger a memory allocation failure scenario that is not properly checked, leading to undefined behavior and potential system crash.

Exploitation requires local access and the ability to initiate XFS scrub operations. No authentication beyond local user privileges is required. The impact is limited to denial of service via system crash or hang.


How to mitigate CVE-2026-23250

Install security update from vendor's repository.

Sources