CVE-2026-23201
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
14/02/2026
Última modificación:
14/02/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ceph: fix oops due to invalid pointer for kfree() in parse_longname()<br />
<br />
This fixes a kernel oops when reading ceph snapshot directories (.snap),<br />
for example by simply running `ls /mnt/my_ceph/.snap`.<br />
<br />
The variable str is guarded by __free(kfree), but advanced by one for<br />
skipping the initial &#39;_&#39; in snapshot names. Thus, kfree() is called<br />
with an invalid pointer. This patch removes the need for advancing the<br />
pointer so kfree() is called with correct memory pointer.<br />
<br />
Steps to reproduce:<br />
<br />
1. Create snapshots on a cephfs volume (I&#39;ve 63 snaps in my testcase)<br />
<br />
2. Add cephfs mount to fstab<br />
$ echo "samba-fileserver@.files=/volumes/datapool/stuff/3461082b-ecc9-4e82-8549-3fd2590d3fb6 /mnt/test/stuff ceph acl,noatime,_netdev 0 0" >> /etc/fstab<br />
<br />
3. Reboot the system<br />
$ systemctl reboot<br />
<br />
4. Check if it&#39;s really mounted<br />
$ mount | grep stuff<br />
<br />
5. List snapshots (expected 63 snapshots on my system)<br />
$ ls /mnt/test/stuff/.snap<br />
<br />
Now ls hangs forever and the kernel log shows the oops.



