Description
In the Linux kernel, the following vulnerability has been resolved:

interconnect: debugfs: initialize src_node and dst_node to empty strings

The debugfs_create_str() API assumes that the string pointer is either NULL
or points to valid kmalloc() memory. Leaving the pointer uninitialized can
cause problems.

Initialize src_node and dst_node to empty strings before creating the
debugfs entries to guarantee that reads and writes are safe.
Published: 2026-02-14
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Kernel crash and denial of service
Action: Immediate Patch
AI Analysis

Impact

The Linux kernel’s debugfs_create_str() routine expects a valid pointer or NULL for the string it creates. In this vulnerability the src_node and dst_node strings were left uninitialized before the debugfs entries were created, causing the routine to operate on undefined memory. This can lead to an invalid memory access in the kernel, resulting in a crash or data corruption. The impact is limited to systems running the affected kernel with debugfs enabled and would typically require local system access. The weakness is listed as CWE‑908, a buffer or string misuse issue.

Affected Systems

Linux kernel 6.19 release candidates rc1 through rc6 are affected. All distributions shipping these kernels are at risk unless the patch has been applied.

Risk and Exploitability

The CVSS score of 5.5 indicates moderate severity. The EPSS score is below 1%, implying low exploitation likelihood. It is not listed in CISA’s KEV catalog. The likely attack vector is local; an attacker would need to trigger the creation of the vulnerable debugfs entries, which requires kernel context. Exploitation would most likely result in a kernel crash or data corruption rather than arbitrary code execution.

Generated by OpenCVE AI on April 18, 2026 at 18:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the kernel patch that initializes src_node and dst_node strings before debugfs entries are created
  • Upgrade to kernel 6.19‑rc7 or later, which contains the fix
  • If an upgrade is not possible, disable debugfs by setting CONFIG_DEBUG_FS=n or unmounting the debugfs mount point to prevent exposure of the vulnerable API

Generated by OpenCVE AI on April 18, 2026 at 18:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-908
CPEs cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*

Mon, 16 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Sat, 14 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: interconnect: debugfs: initialize src_node and dst_node to empty strings The debugfs_create_str() API assumes that the string pointer is either NULL or points to valid kmalloc() memory. Leaving the pointer uninitialized can cause problems. Initialize src_node and dst_node to empty strings before creating the debugfs entries to guarantee that reads and writes are safe.
Title interconnect: debugfs: initialize src_node and dst_node to empty strings
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-02-14T15:09:53.369Z

Reserved: 2026-01-13T15:37:45.970Z

Link: CVE-2026-23123

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-02-14T15:16:07.500

Modified: 2026-03-18T14:50:40.470

Link: CVE-2026-23123

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-02-14T00:00:00Z

Links: CVE-2026-23123 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T18:15:06Z

Weaknesses