CVE-2026-23189

Source
https://cve.org/CVERecord?id=CVE-2026-23189
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23189.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-23189
Downstream
Related
Published
2026-02-14T16:27:17.549Z
Modified
2026-04-02T17:30:34.219601387Z
Summary
ceph: fix NULL pointer dereference in ceph_mds_auth_match()
Details

In the Linux kernel, the following vulnerability has been resolved:

ceph: fix NULL pointer dereference in cephmdsauth_match()

The CephFS kernel client has regression starting from 6.18-rc1. We have issue in cephmdsauthmatch() if fsname == NULL:

const char fs_name = mdsc->fsc->mount_options->mds_namespace;
...
if (auth->match.fs_name && strcmp(auth->match.fs_name, fs_name)) {
        / fsname mismatch, try next one */
        return 0;
}

Patrick Donnelly suggested that: In summary, we should definitely start decoding fs_name from the MDSMap and do strict authorizations checks against it. Note that the -o mds_namespace=foo should only be used for selecting the file system to mount and nothing else. It's possible no mds_namespace is specified but the kernel will mount the only file system that exists which may have name "foo".

This patch reworks cephmdsmapdecode() and namespaceequals() with the goal of supporting the suggested concept. Now struct cephmdsmap contains mfsname field that receives copy of extracted FS name by cephextractencoded_string(). For the case of "old" CephFS file systems, it is used "cephfs" name.

[ idryomov: replace redundant %*pE with %s in cephmdsmapdecode(), get rid of a series of strlen() calls in cephnamespacematch(), drop changes to namespaceequals() body to avoid treating empty mdsnamespace as equal, drop changes to cephmdschandlefsmap() as namespaceequals() isn't an equivalent substitution there ]

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23189.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
07640d34a781bb2e39020a39137073c03c4aa932
Fixed
c6f8326f26bd20d648d9a55afd68148d1b6afe28
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
22c73d52a6d05c5a2053385c0d6cd9984732799d
Fixed
57b36ffc8881dd455d875f85c105901974af2130
Fixed
7987cce375ac8ce98e170a77aa2399f2cf6eb99f
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
ca3da8b27ab9a0923ad477447cfb8fc7f4b4c523

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23189.json"