CVE-2026-23002
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
25/01/2026
Última modificación:
25/01/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
lib/buildid: use __kernel_read() for sleepable context<br />
<br />
Prevent a "BUG: unable to handle kernel NULL pointer dereference in<br />
filemap_read_folio".<br />
<br />
For the sleepable context, convert freader to use __kernel_read() instead<br />
of direct page cache access via read_cache_folio(). This simplifies the<br />
faultable code path by using the standard kernel file reading interface<br />
which handles all the complexity of reading file data.<br />
<br />
At the moment we are not changing the code for non-sleepable context which<br />
uses filemap_get_folio() and only succeeds if the target folios are<br />
already in memory and up-to-date. The reason is to keep the patch simple<br />
and easier to backport to stable kernels.<br />
<br />
Syzbot repro does not crash the kernel anymore and the selftests run<br />
successfully.<br />
<br />
In the follow up we will make __kernel_read() with IOCB_NOWAIT work for<br />
non-sleepable contexts. In addition, I would like to replace the<br />
secretmem check with a more generic approach and will add fstest for the<br />
buildid code.



