CVE-2026-23201
MediumVulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
ceph: fix oops due to invalid pointer for kfree() in parse_longname()
This fixes a kernel oops when reading ceph snapshot directories (.snap),
for example by simply running `ls /mnt/my_ceph/.snap`.
The variable str is guarded by __free(kfree), but advanced by one for
skipping the initial '_' in snapshot names. Thus, kfree() is called
with an invalid pointer. This patch removes the need for advancing the
pointer so kfree() is called with correct memory pointer.
Steps to reproduce:
1. Create snapshots on a cephfs volume (I've 63 snaps in my testcase)
2. Add cephfs mount to fstab
$ echo "samba-fileserver@.files=/volumes/datapool/stuff/3461082b-ecc9-4e82-8549-3fd2590d3fb6 /mnt/test/stuff ceph acl,noatime,_netdev 0 0" >> /etc/fstab
3. Reboot the system
$ systemctl reboot
4. Check if it's really mounted
$ mount | grep stuff
5. List snapshots (expected 63 snapshots on my system)
$ ls /mnt/test/stuff/.snap
Now ls hangs forever and the kernel log shows the oops.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Known Affected Software
59 configuration(s) from 1 vendor(s)
cpe:2.3:o:linux:linux_kernel:6.12.67:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12.55:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12.53:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12.60:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12.52:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12.62:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12.44:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12.47:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12.56:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12.49:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12.58:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12.59:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12.68:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12.42:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12.46:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12.54:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12.50:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12.51:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12.45:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12.43:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12.61:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12.63:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12.57:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12.48:*:*:*:*:*:*:*
CVE-2026-23201
CVE-2026-23201
References & Resources
-
https://git.kernel.org/stable/c/8c9af7339de419819cfc641d551675d38ff99abf416baaa9-dc9f-4396-8d5f-8c081fb06d67 Patch
-
https://git.kernel.org/stable/c/bc8dedae022ce3058659c3addef3ec4b41d15e00416baaa9-dc9f-4396-8d5f-8c081fb06d67 Patch
-
https://git.kernel.org/stable/c/e258ed369c9e04caa7d2fd49785d753ae4034cb6416baaa9-dc9f-4396-8d5f-8c081fb06d67 Patch
Severity Details
Weakness Type (CWE)
NULL Pointer Dereference
- Description
- The product dereferences a pointer that it expects to be valid but is NULL.
- Exploit Likelihood
- Medium
- Typical Severity
- High
- Abstraction Level
- Base
Key Information
- Published Date
- February 14, 2026
