In the Linux kernel, the following vulnerability has been resolved:
libceph: make free_choose_arg_map() resilient to partial allocation
free_choose_arg_map() may dereference a NULL pointer if its caller fails
after a partial allocation.
For example, in decode_choose_args(), if allocation of arg_map->args
fails, execution jumps to the fail label and free_choose_arg_map() is
called. Since arg_map->size is updated to a non-zero value before memory
allocation, free_choose_arg_map() will iterate over arg_map->args and
dereference a NULL pointer.
To prevent this potential NULL pointer dereference and make
free_choose_arg_map() more resilient, add checks for pointers before
iterating.
References
Configurations
Configuration 1 (hide)
|
History
26 Feb 2026, 18:50
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:* |
|
| CWE | CWE-476 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux
Linux linux Kernel |
|
| References | () https://git.kernel.org/stable/c/8081faaf089db5280c3be820948469f7c58ef8dd - Patch | |
| References | () https://git.kernel.org/stable/c/851241d3f78a5505224dc21c03d8692f530256b4 - Patch | |
| References | () https://git.kernel.org/stable/c/9b3730dabcf3764bfe3ff07caf55e641a0b45234 - Patch | |
| References | () https://git.kernel.org/stable/c/c4c2152a858c0ce4d2bff6ca8c1d5b0ef9f2cbdf - Patch | |
| References | () https://git.kernel.org/stable/c/e3fe30e57649c551757a02e1cad073c47e1e075e - Patch | |
| References | () https://git.kernel.org/stable/c/ec1850f663da64842614c86b20fe734be070c2ba - Patch | |
| References | () https://git.kernel.org/stable/c/f21c3fdb96833aac2f533506899fe38c19cf49d5 - Patch |
23 Jan 2026, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-23 16:15
Updated : 2026-02-26 18:50
NVD link : CVE-2026-22991
Mitre link : CVE-2026-22991
CVE.ORG link : CVE-2026-22991
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
