CVE-2026-23251

Source
https://cve.org/CVERecord?id=CVE-2026-23251
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23251.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-23251
Downstream
Published
2026-03-18T17:01:42.483Z
Modified
2026-04-02T13:12:18.414726Z
Summary
xfs: only call xf{array,blob}_destroy if we have a valid pointer
Details

In the Linux kernel, the following vulnerability has been resolved:

xfs: only call xf{array,blob}_destroy if we have a valid pointer

Only call the xfarray and xfblob destructor if we have a valid pointer, and be sure to null out that pointer afterwards. Note that this patch fixes a large number of commits, most of which were merged between 6.9 and 6.10.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23251.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ab97f4b1c030750f2475bf4da8a9554d02206640
Fixed
5de5be3ed7e7fa4ebde4f4b58fb9a629644f9202
Fixed
c9ccefacae0d8091683447bc338bd7741417039d
Fixed
d827612c81a26cc1dd83a211cfcb5ad8765da0c4
Fixed
ba408d299a3bb3c5309f40c5326e4fb83ead4247

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23251.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.10.0
Fixed
6.12.75
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.16
Type
ECOSYSTEM
Events
Introduced
6.19.0
Fixed
6.19.6

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23251.json"