CVE-2026-23145
📋 TL;DR
This CVE describes a memory leak vulnerability in the Linux kernel's ext4 filesystem driver. When handling extended attributes on inodes, the kernel fails to properly release buffer head references in error conditions, potentially leading to resource exhaustion. This affects all Linux systems using ext4 filesystems.
💻 Affected Systems
- Linux kernel
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Sustained exploitation could lead to kernel memory exhaustion, causing system instability, denial of service, or potential kernel crashes.
Likely Case
Gradual memory leak over time leading to performance degradation and eventual system instability requiring reboot.
If Mitigated
Minimal impact with proper monitoring and memory limits in place.
🎯 Exploit Status
Requires local access and ability to trigger specific error conditions in ext4 xattr operations
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply kernel patches from provided git references
Vendor Advisory: https://git.kernel.org/stable/c/06e26287f2e349a28ad363941ffd9076bfed8b2e
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix. 2. Check distribution-specific security advisories. 3. Reboot system after kernel update.
🔧 Temporary Workarounds
Disable extended attributes
allMount ext4 filesystems with 'noacl' and 'noattr' options to disable extended attribute support
mount -o remount,noacl,noattr /mount/point
🧯 If You Can't Patch
- Monitor kernel memory usage for unusual growth patterns
- Implement process resource limits to contain potential memory leaks
🔍 How to Verify
Check if Vulnerable:
Check kernel version and verify if ext4 xattr operations are being used on the system
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes the referenced git commits or check with distribution security updates
📡 Detection & Monitoring
Log Indicators:
- Kernel OOM (Out of Memory) messages
- System instability logs
- High memory usage by kernel processes
Network Indicators:
- None - local filesystem vulnerability
SIEM Query:
source="kernel" AND ("out of memory" OR "OOM" OR "memory allocation failure")
🔗 References
- https://git.kernel.org/stable/c/06e26287f2e349a28ad363941ffd9076bfed8b2e
- https://git.kernel.org/stable/c/0b06cde92f2f960f4ebe3c988c69f2711f2a24dc
- https://git.kernel.org/stable/c/3b00c16e42428a1ecd3a5eb9cc37f8ad9bd47626
- https://git.kernel.org/stable/c/6241cd1d0acc2363016ac55b8773ba1332dd59d7
- https://git.kernel.org/stable/c/7c9f059c3d531a12d7ad96cd34a44b8af7c00d5f
- https://git.kernel.org/stable/c/8e8542c539927ae3898a4d02941f84e252e2dea1
- https://git.kernel.org/stable/c/d250bdf531d9cd4096fedbb9f172bb2ca660c868