CVE-2026-23201

MEDIUM

Linux kernel - Memory Corruption

Title source: llm
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: ceph: fix oops due to invalid pointer for kfree() in parse_longname() This fixes a kernel oops when reading ceph snapshot directories (.snap), for example by simply running `ls /mnt/my_ceph/.snap`. The variable str is guarded by __free(kfree), but advanced by one for skipping the initial '_' in snapshot names. Thus, kfree() is called with an invalid pointer. This patch removes the need for advancing the pointer so kfree() is called with correct memory pointer. Steps to reproduce: 1. Create snapshots on a cephfs volume (I've 63 snaps in my testcase) 2. Add cephfs mount to fstab $ echo "[email protected]=/volumes/datapool/stuff/3461082b-ecc9-4e82-8549-3fd2590d3fb6 /mnt/test/stuff ceph acl,noatime,_netdev 0 0" >> /etc/fstab 3. Reboot the system $ systemctl reboot 4. Check if it's really mounted $ mount | grep stuff 5. List snapshots (expected 63 snapshots on my system) $ ls /mnt/test/stuff/.snap Now ls hangs forever and the kernel log shows the oops.

Scores

CVSS v3 5.5
EPSS 0.0002
EPSS Percentile 4.5%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-476
Status published
Products (14)
linux/Kernel < 6.12.70linux
linux/Kernel 6.13.0 - 6.18.10linux
Linux/Linux < 6.17
Linux/Linux 101841c38346f4ca41dc1802c867da990ffb32eb - bc8dedae022ce3058659c3addef3ec4b41d15e00
Linux/Linux 101841c38346f4ca41dc1802c867da990ffb32eb - e258ed369c9e04caa7d2fd49785d753ae4034cb6
Linux/Linux 3145b2b11492d61c512bbc59660bb823bc757f48
Linux/Linux 493479af8af3ab907f49e99323777d498a4fbd2b
Linux/Linux 6.12.70 - 6.12.*
Linux/Linux 6.17
Linux/Linux 6.18.10 - 6.18.*
... and 4 more
Published Feb 14, 2026
Tracked Since Feb 18, 2026