CVE-2026-23183
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
14/02/2026
Última modificación:
14/02/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
cgroup/dmem: fix NULL pointer dereference when setting max<br />
<br />
An issue was triggered:<br />
<br />
BUG: kernel NULL pointer dereference, address: 0000000000000000<br />
#PF: supervisor read access in kernel mode<br />
#PF: error_code(0x0000) - not-present page<br />
PGD 0 P4D 0<br />
Oops: Oops: 0000 [#1] SMP NOPTI<br />
CPU: 15 UID: 0 PID: 658 Comm: bash Tainted: 6.19.0-rc6-next-2026012<br />
Tainted: [O]=OOT_MODULE<br />
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),<br />
RIP: 0010:strcmp+0x10/0x30<br />
RSP: 0018:ffffc900017f7dc0 EFLAGS: 00000246<br />
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff888107cd4358<br />
RDX: 0000000019f73907 RSI: ffffffff82cc381a RDI: 0000000000000000<br />
RBP: ffff8881016bef0d R08: 000000006c0e7145 R09: 0000000056c0e714<br />
R10: 0000000000000001 R11: ffff888107cd4358 R12: 0007ffffffffffff<br />
R13: ffff888101399200 R14: ffff888100fcb360 R15: 0007ffffffffffff<br />
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br />
CR2: 0000000000000000 CR3: 0000000105c79000 CR4: 00000000000006f0<br />
Call Trace:<br />
<br />
dmemcg_limit_write.constprop.0+0x16d/0x390<br />
? __pfx_set_resource_max+0x10/0x10<br />
kernfs_fop_write_iter+0x14e/0x200<br />
vfs_write+0x367/0x510<br />
ksys_write+0x66/0xe0<br />
do_syscall_64+0x6b/0x390<br />
entry_SYSCALL_64_after_hwframe+0x76/0x7e<br />
RIP: 0033:0x7f42697e1887<br />
<br />
It was trriggered setting max without limitation, the command is like:<br />
"echo test/region0 > dmem.max". To fix this issue, add check whether<br />
options is valid after parsing the region_name.



