DNA View

CVE-2026-23218

Medium
Low Medium High Critical
5.5
CVSS Score
Published: Feb 18, 2026
Last Modified: Mar 18, 2026

Vulnerability Description

In the Linux kernel, the following vulnerability has been resolved:

gpio: loongson-64bit: Fix incorrect NULL check after devm_kcalloc()

Fix incorrect NULL check in loongson_gpio_init_irqchip().
The function checks chip->parent instead of chip->irq.parents.

CVSS Metrics

Common Vulnerability Scoring System

Vector String:

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Attack Vector
L
Attack Complexity
L
Privileges Required
L
User Interaction
N
Scope
U
Confidentiality
N
Integrity
N
Availability
H

Known Affected Software

7 configuration(s) from 1 vendor(s)

linux_kernel
Version:
6.18
CPE:
cpe:2.3:o:linux:linux_kernel:6.18:-:*:*:*:*:*:*
linux_kernel
Version:
6.18.3
CPE:
cpe:2.3:o:linux:linux_kernel:6.18.3:*:*:*:*:*:*:*
linux_kernel
Version:
6.18.8
CPE:
cpe:2.3:o:linux:linux_kernel:6.18.8:*:*:*:*:*:*:*
linux_kernel
Version:
6.18.7
CPE:
cpe:2.3:o:linux:linux_kernel:6.18.7:*:*:*:*:*:*:*
linux_kernel
Version:
6.18.2
CPE:
cpe:2.3:o:linux:linux_kernel:6.18.2:*:*:*:*:*:*:*
linux_kernel
Version:
6.19
CPE:
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
linux_kernel
Version:
6.18.1
CPE:
cpe:2.3:o:linux:linux_kernel:6.18.1:*:*:*:*:*:*:*
This vulnerability affects 7 software configuration(s). Ensure you patch all affected systems.

Available Security Patches

1 patch available from vendors

View All Patches
SUSE

CVE-2026-23218

CVE-2026-23218

Severity
Unknown
Released
Mar 05, 2026
Security Update

Severity Details

5.5
out of 10.0
Medium

Weakness Type (CWE)

CWE-476 Top 25 #21

NULL Pointer Dereference

Description
The product dereferences a pointer that it expects to be valid but is NULL.
Exploit Likelihood
Medium
Typical Severity
High
Abstraction Level
Base

Key Information

Published Date
February 18, 2026