Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2026-03582

Опубликовано: 23 янв. 2026
Источник: fstec
CVSS3: 5.5
CVSS2: 4.6
EPSS Низкий

Описание

Уязвимость функции xrep_revalidate_allocbt() ядра операционной системы Linux связана с ошибкой разыменования указателей. Эксплуатация уязвимости может позволить нарушителю вызвать отказ в обслуживании

Вендор

Red Hat Inc.
Сообщество свободного программного обеспечения

Наименование ПО

Red Hat Enterprise Linux
Linux

Версия ПО

9 (Red Hat Enterprise Linux)
10 (Red Hat Enterprise Linux)
от 6.18.0 до 6.18.16 (Linux)
от 6.19.0 до 6.19.6 (Linux)
от 7.0.0 до 7.0-rc1 (Linux)
от 6.8.0 до 6.12.75 (Linux)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

Red Hat Inc. Red Hat Enterprise Linux 9
Red Hat Inc. Red Hat Enterprise Linux 10
Сообщество свободного программного обеспечения Linux от 6.18.0 до 6.18.16
Сообщество свободного программного обеспечения Linux от 6.19.0 до 6.19.6
Сообщество свободного программного обеспечения Linux от 7.0.0 до 7.0-rc1
Сообщество свободного программного обеспечения Linux от 6.8.0 до 6.12.75

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 4,6)
Средний уровень опасности (базовая оценка CVSS 3.1 составляет 5,5)

Возможные меры по устранению уязвимости

В условиях отсутствия обновлений безопасности от производителя рекомендуется придерживаться ""Рекомендаций по безопасной настройке операционных систем LINUX"", изложенных в методическом документе ФСТЭК России, утверждённом 25 декабря 2022 года.
Использование рекомендаций:
Для Linux:
https://lore.kernel.org/linux-cve-announce/2026031843-CVE-2026-23249-c309@gregkh/
https://git.kernel.org/stable/c/55e03b8cbe2783ec9acfb88e8adb946ed504e117
https://git.kernel.org/stable/c/5991e96f2ae82df60a3e4ed00f3432d9f3502a99
https://git.kernel.org/stable/c/b04baa848c0543b240b1bd8aecff470382f6f154
https://git.kernel.org/stable/c/d69de525bc7ab27713342080bf50826df3f6a68f
Для продуктов Red Hat Inc.:
https://access.redhat.com/security/cve/cve-2026-23249

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 6%
0.00023
Низкий

5.5 Medium

CVSS3

4.6 Medium

CVSS2

Связанные уязвимости

ubuntu
10 дней назад

In the Linux kernel, the following vulnerability has been resolved: xfs: check for deleted cursors when revalidating two btrees The free space and inode btree repair functions will rebuild both btrees at the same time, after which it needs to evaluate both btrees to confirm that the corruptions are gone. However, Jiaming Zhang ran syzbot and produced a crash in the second xchk_allocbt call. His root-cause analysis is as follows (with minor corrections): In xrep_revalidate_allocbt(), xchk_allocbt() is called twice (first for BNOBT, second for CNTBT). The cause of this issue is that the first call nullified the cursor required by the second call. Let's first enter xrep_revalidate_allocbt() via following call chain: xfs_file_ioctl() -> xfs_ioc_scrubv_metadata() -> xfs_scrub_metadata() -> `sc->ops->repair_eval(sc)` -> xrep_revalidate_allocbt() xchk_allocbt() is called twice in this function. In the first call: /* Note that sc->sm->sm_type is XFS_SCRUB_TYPE_BNOPT now */ xchk_allocbt() -...

CVSS3: 5.5
redhat
11 дней назад

A NULL pointer dereference vulnerability was found in the Linux kernel's XFS filesystem scrub/repair code. In xrep_revalidate_allocbt(), when revalidating both the BNOBT and CNTBT btrees, if the first btree validation fails during cross-reference, the second btree cursor is nullified. The code then attempts to revalidate the second btree using the NULL cursor, causing a kernel crash.

nvd
11 дней назад

In the Linux kernel, the following vulnerability has been resolved: xfs: check for deleted cursors when revalidating two btrees The free space and inode btree repair functions will rebuild both btrees at the same time, after which it needs to evaluate both btrees to confirm that the corruptions are gone. However, Jiaming Zhang ran syzbot and produced a crash in the second xchk_allocbt call. His root-cause analysis is as follows (with minor corrections): In xrep_revalidate_allocbt(), xchk_allocbt() is called twice (first for BNOBT, second for CNTBT). The cause of this issue is that the first call nullified the cursor required by the second call. Let's first enter xrep_revalidate_allocbt() via following call chain: xfs_file_ioctl() -> xfs_ioc_scrubv_metadata() -> xfs_scrub_metadata() -> `sc->ops->repair_eval(sc)` -> xrep_revalidate_allocbt() xchk_allocbt() is called twice in this function. In the first call: /* Note that sc->sm->sm_type is XFS_SCRUB_TYPE_BNOPT now */

debian
11 дней назад

In the Linux kernel, the following vulnerability has been resolved: x ...

github
11 дней назад

In the Linux kernel, the following vulnerability has been resolved: xfs: check for deleted cursors when revalidating two btrees The free space and inode btree repair functions will rebuild both btrees at the same time, after which it needs to evaluate both btrees to confirm that the corruptions are gone. However, Jiaming Zhang ran syzbot and produced a crash in the second xchk_allocbt call. His root-cause analysis is as follows (with minor corrections): In xrep_revalidate_allocbt(), xchk_allocbt() is called twice (first for BNOBT, second for CNTBT). The cause of this issue is that the first call nullified the cursor required by the second call. Let's first enter xrep_revalidate_allocbt() via following call chain: xfs_file_ioctl() -> xfs_ioc_scrubv_metadata() -> xfs_scrub_metadata() -> `sc->ops->repair_eval(sc)` -> xrep_revalidate_allocbt() xchk_allocbt() is called twice in this function. In the first call: /* Note that sc->sm->sm_type is XFS_SCRUB_TYPE_BNOPT now ...

EPSS

Процентиль: 6%
0.00023
Низкий

5.5 Medium

CVSS3

4.6 Medium

CVSS2