CVE-2026-23249
Null Pointer Dereference in Linux XFS Btree Revalidation
Publication date: 2026-03-18
Last updated on: 2026-03-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux_kernel | xfs | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's XFS filesystem code, specifically in the functions that repair and revalidate two btrees related to free space and inode allocation.
During the repair process, two btrees (BNOBT and CNTBT) are revalidated by calling the function xchk_allocbt() twice. The first call nullifies a cursor needed by the second call, which leads to a null pointer dereference and a kernel crash.
The root cause is that after the first btree revalidation fails due to corruption, the cursor for the second btree is deleted (nullified), but the code does not check for this before attempting to revalidate the second btree, causing the crash.
The fix involves checking for a null cursor before revalidating the second btree and marking the repair as incomplete if the first tree is corrupt, preventing the crash.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash due to a null pointer dereference when repairing corrupted XFS filesystem metadata.
Such a crash can lead to system instability, potential data loss, or denial of service if the filesystem repair process is triggered.
Systems relying on XFS filesystems may experience unexpected reboots or failures during filesystem maintenance operations.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know