CVE-2026-23189
NULL Pointer Dereference in Linux Kernel CephFS Client
Publication date: 2026-02-14
Last updated on: 2026-03-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.12.58 (inc) to 6.12.70 (exc) |
| linux | linux_kernel | From 6.17.8 (inc) to 6.18.10 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a NULL pointer dereference in the Linux kernel's CephFS client, specifically in the function ceph_mds_auth_match(). It occurs when the variable fs_name is NULL, leading to improper handling in authorization checks.
The issue arises because the code attempts to compare an authorization match fs_name with the mounted file system name without properly decoding or validating it, which can cause a NULL pointer dereference and potentially crash the kernel.
The patch fixes this by reworking how the file system name is decoded and stored, ensuring strict authorization checks against the decoded name, and avoiding treating empty namespaces as equal.
How can this vulnerability impact me? :
This vulnerability can cause a NULL pointer dereference in the kernel, which may lead to a kernel crash or denial of service on systems using the CephFS kernel client.
Such a crash could disrupt access to the Ceph file system, potentially affecting system stability and availability.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know