CVE-2026-23189

Severity
5.5MEDIUM
EPSS
0.0%
top 96.99%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 14

Description

In the Linux kernel, the following vulnerability has been resolved: ceph: fix NULL pointer dereference in ceph_mds_auth_match() The CephFS kernel client has regression starting from 6.18-rc1. We have issue in ceph_mds_auth_match() if fs_name == NULL: const char fs_name = mdsc->fsc->mount_options->mds_namespace; ... if (auth->match.fs_name && strcmp(auth->match.fs_name, fs_name)) { / fsname mismatch, try next one */ return 0; } Patrick Donnelly suggested that: In summary, we should definitely

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

NVDlinux/linux_kernel6.12.586.12.70+2
CVEListV5linux/linux07640d34a781bb2e39020a39137073c03c4aa932c6f8326f26bd20d648d9a55afd68148d1b6afe28+4
Debianlinux< 6.12.73-1+1

Patches

🔴Vulnerability Details

3
OSV
CVE-2026-23189: In the Linux kernel, the following vulnerability has been resolved: ceph: fix NULL pointer dereference in ceph_mds_auth_match() The CephFS kernel clie2026-02-14
GHSA
GHSA-r35m-5r25-v2fx: In the Linux kernel, the following vulnerability has been resolved: ceph: fix NULL pointer dereference in ceph_mds_auth_match() The CephFS kernel cl2026-02-14
CVEList
ceph: fix NULL pointer dereference in ceph_mds_auth_match()2026-02-14

📋Vendor Advisories

2
Red Hat
kernel: ceph: fix NULL pointer dereference in ceph_mds_auth_match()2026-02-14
Debian
CVE-2026-23189: linux - In the Linux kernel, the following vulnerability has been resolved: ceph: fix N...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23189 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23189 (MEDIUM CVSS 5.5) | In the Linux kernel | cvebase.io