CVE-2026-23423Missing Release of Resource after Effective Lifetime in Linux

Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 94.06%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 3

Description

In the Linux kernel, the following vulnerability has been resolved: btrfs: free pages on error in btrfs_uring_read_extent() In this function the 'pages' object is never freed in the hopes that it is picked up by btrfs_uring_read_finished() whenever that executes in the future. But that's just the happy path. Along the way previous allocations might have gone wrong, or we might not get -EIOCBQUEUED from btrfs_encoded_read_regular_fill_pages(). In all these cases, we go to a cleanup section that

Affected Packages3 packages

Debianlinux/linux_kernel< 6.19.8-1
CVEListV5linux/linux34310c442e175f286b4c06ab5caa4e0b267ea31cd4f210de01eaccac61eee657f676045ef9771d07+3
debiandebian/linux< linux 6.19.8-1 (forky)

🔴Vulnerability Details

2
OSV
CVE-2026-23423: In the Linux kernel, the following vulnerability has been resolved: btrfs: free pages on error in btrfs_uring_read_extent() In this function the 'page2026-04-03
GHSA
GHSA-rc42-xqq7-h58r: In the Linux kernel, the following vulnerability has been resolved: btrfs: free pages on error in btrfs_uring_read_extent() In this function the 'pa2026-04-03

📋Vendor Advisories

2
Red Hat
kernel: btrfs: free pages on error in btrfs_uring_read_extent()2026-04-03
Debian
CVE-2026-23423: linux - In the Linux kernel, the following vulnerability has been resolved: btrfs: free...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23423 Impact, Exploitability, and Mitigation Steps | Wiz