CVE-2026-23201

Severity
5.5MEDIUM
EPSS
0.0%
top 96.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 14

Description

In the Linux kernel, the following vulnerability has been resolved: ceph: fix oops due to invalid pointer for kfree() in parse_longname() This fixes a kernel oops when reading ceph snapshot directories (.snap), for example by simply running `ls /mnt/my_ceph/.snap`. The variable str is guarded by __free(kfree), but advanced by one for skipping the initial '_' in snapshot names. Thus, kfree() is called with an invalid pointer. This patch removes the need for advancing the pointer so kfree() is

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

NVDlinux/linux_kernel6.12.426.12.70+3
CVEListV5linux/linuxbb80f7618832d26f7e395f52f82b1dac76223e5f8c9af7339de419819cfc641d551675d38ff99abf+5
Debianlinux< 6.12.73-1+1

Patches

🔴Vulnerability Details

3
GHSA
GHSA-3mg9-9f72-h562: In the Linux kernel, the following vulnerability has been resolved: ceph: fix oops due to invalid pointer for kfree() in parse_longname() This fixes2026-02-14
OSV
CVE-2026-23201: In the Linux kernel, the following vulnerability has been resolved: ceph: fix oops due to invalid pointer for kfree() in parse_longname() This fixes a2026-02-14
CVEList
ceph: fix oops due to invalid pointer for kfree() in parse_longname()2026-02-14

📋Vendor Advisories

2
Red Hat
kernel: ceph: fix oops due to invalid pointer for kfree() in parse_longname()2026-02-14
Debian
CVE-2026-23201: linux - In the Linux kernel, the following vulnerability has been resolved: ceph: fix o...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23201 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23201 (MEDIUM CVSS 5.5) | In the Linux kernel | cvebase.io