CVE-2026-22991
EUVD-2026-429123.01.2026, 16:15
In the Linux kernel, the following vulnerability has been resolved: libceph: make free_choose_arg_map() resilient to partial allocation free_choose_arg_map() may dereference a NULL pointer if its caller fails after a partial allocation. For example, in decode_choose_args(), if allocation of arg_map->args fails, execution jumps to the fail label and free_choose_arg_map() is called. Since arg_map->size is updated to a non-zero value before memory allocation, free_choose_arg_map() will iterate over arg_map->args and dereference a NULL pointer. To prevent this potential NULL pointer dereference and make free_choose_arg_map() more resilient, add checks for pointers before iterating.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 4.13 ≤ 𝑥 < 5.10.248 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.198 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 6.1.161 |
| linux | linux_kernel | 6.2 ≤ 𝑥 < 6.6.121 |
| linux | linux_kernel | 6.7 ≤ 𝑥 < 6.12.66 |
| linux | linux_kernel | 6.13 ≤ 𝑥 < 6.18.6 |
| linux | linux_kernel | 6.19:rc1 |
| linux | linux_kernel | 6.19:rc2 |
| linux | linux_kernel | 6.19:rc3 |
| linux | linux_kernel | 6.19:rc4 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration
Vulnerability Media Exposure
References