CVE-2026-23201

Source
https://cve.org/CVERecord?id=CVE-2026-23201
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23201.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-23201
Downstream
Published
2026-02-14T16:27:25.693Z
Modified
2026-03-13T04:06:47.302571Z
Summary
ceph: fix oops due to invalid pointer for kfree() in parse_longname()
Details

In the Linux kernel, the following vulnerability has been resolved:

ceph: fix oops due to invalid pointer for kfree() in parse_longname()

This fixes a kernel oops when reading ceph snapshot directories (.snap), for example by simply running ls /mnt/my_ceph/.snap.

The variable str is guarded by _free(kfree), but advanced by one for skipping the initial '' in snapshot names. Thus, kfree() is called with an invalid pointer. This patch removes the need for advancing the pointer so kfree() is called with correct memory pointer.

Steps to reproduce:

  1. Create snapshots on a cephfs volume (I've 63 snaps in my testcase)

  2. Add cephfs mount to fstab $ echo "samba-fileserver@.files=/volumes/datapool/stuff/3461082b-ecc9-4e82-8549-3fd2590d3fb6 /mnt/test/stuff ceph acl,noatime,_netdev 0 0" >> /etc/fstab

  3. Reboot the system $ systemctl reboot

  4. Check if it's really mounted $ mount | grep stuff

  5. List snapshots (expected 63 snapshots on my system) $ ls /mnt/test/stuff/.snap

Now ls hangs forever and the kernel log shows the oops.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23201.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
bb80f7618832d26f7e395f52f82b1dac76223e5f
Fixed
8c9af7339de419819cfc641d551675d38ff99abf
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
101841c38346f4ca41dc1802c867da990ffb32eb
Fixed
e258ed369c9e04caa7d2fd49785d753ae4034cb6
Fixed
bc8dedae022ce3058659c3addef3ec4b41d15e00
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
3145b2b11492d61c512bbc59660bb823bc757f48
Last affected
493479af8af3ab907f49e99323777d498a4fbd2b

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23201.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.12.70
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.10

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23201.json"