CVE-2026-23251
xfs: only call xf{array,blob}_destroy if we have a valid pointer
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: xfs: only call xf{array,blob}_destroy if we have a valid pointer Only call the xfarray and xfblob destructor if we have a valid pointer, and be sure to null out that pointer afterwards. Note that this patch fixes a large number of commits, most of which were merged between 6.9 and 6.10.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Mar 18, 2026 |
| Last Updated | Apr 13, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
ab97f4b1c030750f2475bf4da8a9554d02206640 < 5de5be3ed7e7fa4ebde4f4b58fb9a629644f9202 ab97f4b1c030750f2475bf4da8a9554d02206640 < c9ccefacae0d8091683447bc338bd7741417039d ab97f4b1c030750f2475bf4da8a9554d02206640 < d827612c81a26cc1dd83a211cfcb5ad8765da0c4 ab97f4b1c030750f2475bf4da8a9554d02206640 < ba408d299a3bb3c5309f40c5326e4fb83ead4247
Linux / Linux
6.10
References
git.kernel.org: https://git.kernel.org/stable/c/5de5be3ed7e7fa4ebde4f4b58fb9a629644f9202 git.kernel.org: https://git.kernel.org/stable/c/c9ccefacae0d8091683447bc338bd7741417039d git.kernel.org: https://git.kernel.org/stable/c/d827612c81a26cc1dd83a211cfcb5ad8765da0c4 git.kernel.org: https://git.kernel.org/stable/c/ba408d299a3bb3c5309f40c5326e4fb83ead4247