CVE-2026-23218NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 96.15%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 18

Description

In the Linux kernel, the following vulnerability has been resolved: gpio: loongson-64bit: Fix incorrect NULL check after devm_kcalloc() Fix incorrect NULL check in loongson_gpio_init_irqchip(). The function checks chip->parent instead of chip->irq.parents.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

NVDlinux/linux_kernel6.186.18.10+1
Debianlinux/linux_kernel< 6.18.10-1
CVEListV5linux/linux03c146cb6cd14fdab2d2c7ab1b4e8035b54df8cce71e3fa90a15134113f61343392e887cd1f4bf7c+2

Patches

🔴Vulnerability Details

3
GHSA
GHSA-mx8g-qc6m-wcmf: In the Linux kernel, the following vulnerability has been resolved: gpio: loongson-64bit: Fix incorrect NULL check after devm_kcalloc() Fix incorrec2026-02-18
OSV
CVE-2026-23218: In the Linux kernel, the following vulnerability has been resolved: gpio: loongson-64bit: Fix incorrect NULL check after devm_kcalloc() Fix incorrect2026-02-18
CVEList
gpio: loongson-64bit: Fix incorrect NULL check after devm_kcalloc()2026-02-18

📋Vendor Advisories

2
Red Hat
kernel: gpio: loongson-64bit: Fix incorrect NULL check after devm_kcalloc()2026-02-18
Debian
CVE-2026-23218: linux - In the Linux kernel, the following vulnerability has been resolved: gpio: loong...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23218 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23218 — NULL Pointer Dereference in Linux | cvebase