{
  "affected": [
    {
      "ranges": [
        {
          "events": [
            {
              "introduced": "03c146cb6cd14fdab2d2c7ab1b4e8035b54df8cc"
            },
            {
              "fixed": "e71e3fa90a15134113f61343392e887cd1f4bf7c"
            },
            {
              "fixed": "e34f77b09080c86c929153e2a72da26b4f8947ff"
            }
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "type": "GIT"
        }
      ]
    }
  ],
  "database_specific": {
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23218.json"
  },
  "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpio: loongson-64bit: Fix incorrect NULL check after devm_kcalloc()\n\nFix incorrect NULL check in loongson_gpio_init_irqchip().\nThe function checks chip-\u003eparent instead of chip-\u003eirq.parents.",
  "id": "CVE-2026-23218",
  "modified": "2026-04-01T23:10:02.359604996Z",
  "published": "2026-02-18T14:21:55.906Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/e34f77b09080c86c929153e2a72da26b4f8947ff"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/e71e3fa90a15134113f61343392e887cd1f4bf7c"
    },
    {
      "type": "ADVISORY",
      "url": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23218.json"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23218"
    },
    {
      "type": "PACKAGE",
      "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"
    }
  ],
  "schema_version": "1.7.3",
  "summary": "gpio: loongson-64bit: Fix incorrect NULL check after devm_kcalloc()"
}