Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
Linux Kernel: Denial of Service when Setting cgroup/dmem Max Limit
UBUNTU-CVE-2026-23183
Summary
A bug in the Linux kernel could cause the system to crash if a specific command is used. This bug has been fixed in the latest kernel updates. To avoid similar issues, make sure to keep your Linux system up to date and only use authorized commands when working with cgroup/dmem settings.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| canonical | linux-hwe-edge | All versions | – |
| canonical | linux-aws-5.0 | All versions | – |
| canonical | linux-aws-5.3 | All versions | – |
| canonical | linux-azure | All versions | – |
| canonical | linux-azure-5.3 | All versions | – |
| canonical | linux-azure-edge | All versions | – |
| canonical | linux-gcp | All versions | – |
| canonical | linux-gcp-5.3 | All versions | – |
| canonical | linux-gke-4.15 | All versions | – |
| canonical | linux-gke-5.4 | All versions | – |
| canonical | linux-gkeop-5.4 | All versions | – |
| canonical | linux-hwe | All versions | – |
| canonical | linux-hwe-edge | All versions | – |
| canonical | linux-oem | All versions | – |
| canonical | linux-oracle-5.0 | All versions | – |
| canonical | linux-oracle-5.3 | All versions | – |
| canonical | linux-aws-5.11 | All versions | – |
| canonical | linux-aws-5.13 | All versions | – |
| canonical | linux-aws-5.8 | All versions | – |
| canonical | linux-azure-5.11 | All versions | – |
| canonical | linux-azure-5.13 | All versions | – |
| canonical | linux-azure-5.8 | All versions | – |
| canonical | linux-azure-fde | All versions | – |
| canonical | linux-gcp-5.11 | All versions | – |
| canonical | linux-gcp-5.13 | All versions | – |
| canonical | linux-gcp-5.8 | All versions | – |
| canonical | linux-gke | All versions | – |
| canonical | linux-gke-5.15 | All versions | – |
| canonical | linux-gkeop | All versions | – |
| canonical | linux-gkeop-5.15 | All versions | – |
| canonical | linux-hwe-5.11 | All versions | – |
| canonical | linux-hwe-5.13 | All versions | – |
| canonical | linux-hwe-5.8 | All versions | – |
| canonical | linux-intel-5.13 | All versions | – |
| canonical | linux-oem-5.10 | All versions | – |
| canonical | linux-oem-5.13 | All versions | – |
| canonical | linux-oem-5.14 | All versions | – |
| canonical | linux-oem-5.6 | All versions | – |
| canonical | linux-oracle-5.11 | All versions | – |
| canonical | linux-oracle-5.13 | All versions | – |
| canonical | linux-oracle-5.8 | All versions | – |
| canonical | linux-raspi2 | All versions | – |
| canonical | linux-riscv | All versions | – |
| canonical | linux-riscv-5.11 | All versions | – |
| canonical | linux-riscv-5.8 | All versions | – |
| canonical | linux-allwinner-5.19 | All versions | – |
| canonical | linux-aws-5.19 | All versions | – |
| canonical | linux-aws-6.2 | All versions | – |
| canonical | linux-aws-6.5 | All versions | – |
| canonical | linux-azure-5.19 | All versions | – |
| canonical | linux-azure-6.2 | All versions | – |
| canonical | linux-azure-6.5 | All versions | – |
| canonical | linux-azure-fde-5.19 | All versions | – |
| canonical | linux-azure-fde-6.2 | All versions | – |
| canonical | linux-gcp-5.19 | All versions | – |
| canonical | linux-gcp-6.2 | All versions | – |
| canonical | linux-gcp-6.5 | All versions | – |
| canonical | linux-hwe-5.19 | All versions | – |
| canonical | linux-hwe-6.2 | All versions | – |
| canonical | linux-hwe-6.5 | All versions | – |
| canonical | linux-intel-iot-realtime | All versions | – |
| canonical | linux-lowlatency-hwe-5.19 | All versions | – |
| canonical | linux-lowlatency-hwe-6.2 | All versions | – |
| canonical | linux-lowlatency-hwe-6.5 | All versions | – |
| canonical | linux-nvidia-6.2 | All versions | – |
| canonical | linux-nvidia-6.5 | All versions | – |
| canonical | linux-oem-5.17 | All versions | – |
| canonical | linux-oem-6.0 | All versions | – |
| canonical | linux-oem-6.1 | All versions | – |
| canonical | linux-oem-6.5 | All versions | – |
| canonical | linux-oracle-6.5 | All versions | – |
| canonical | linux-realtime | All versions | – |
| canonical | linux-riscv | All versions | – |
| canonical | linux-riscv-5.19 | All versions | – |
| canonical | linux-riscv-6.5 | All versions | – |
| canonical | linux-starfive-5.19 | All versions | – |
| canonical | linux-starfive-6.2 | All versions | – |
| canonical | linux-starfive-6.5 | All versions | – |
| canonical | linux-aws-6.14 | All versions | – |
| canonical | linux-aws-6.17 | All versions | – |
| canonical | linux-azure-6.11 | All versions | – |
| canonical | linux-azure-6.14 | All versions | – |
| canonical | linux-azure-6.17 | All versions | – |
| canonical | linux-azure-fde-6.14 | All versions | – |
| canonical | linux-azure-fde-6.17 | All versions | – |
| canonical | linux-azure-nvidia-6.14 | All versions | – |
| canonical | linux-gcp-6.11 | All versions | – |
| canonical | linux-gcp-6.14 | All versions | – |
| canonical | linux-gcp-6.17 | All versions | – |
| canonical | linux-hwe-6.11 | All versions | – |
| canonical | linux-hwe-6.14 | All versions | – |
| canonical | linux-hwe-6.17 | All versions | – |
| canonical | linux-lowlatency-hwe-6.11 | All versions | – |
| canonical | linux-nvidia-6.11 | All versions | – |
| canonical | linux-oem-6.11 | All versions | – |
| canonical | linux-oem-6.14 | All versions | – |
| canonical | linux-oem-6.17 | All versions | – |
| canonical | linux-oem-6.8 | All versions | – |
| canonical | linux-oracle-6.14 | All versions | – |
| canonical | linux-oracle-6.17 | All versions | – |
| canonical | linux-raspi-realtime | All versions | – |
| canonical | linux-realtime | All versions | – |
| canonical | linux-riscv | All versions | – |
| canonical | linux-riscv-6.14 | All versions | – |
| canonical | linux-riscv-6.17 | All versions | – |
| canonical | linux-realtime-6.14 | All versions | – |
| canonical | linux | All versions | – |
| canonical | linux-aws | All versions | – |
| canonical | linux-azure | All versions | – |
| canonical | linux-azure-fde | All versions | – |
| canonical | linux-gcp | All versions | – |
| canonical | linux-oracle | All versions | – |
| canonical | linux-raspi | All versions | – |
| canonical | linux-realtime | All versions | – |
| canonical | linux-riscv | All versions | – |
Original title
In the Linux kernel, the following vulnerability has been resolved: cgroup/dmem: fix NULL pointer dereference when setting max An issue was triggered: BUG: kernel NULL pointer dereference, address...
Original description
In the Linux kernel, the following vulnerability has been resolved: cgroup/dmem: fix NULL pointer dereference when setting max An issue was triggered: BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: Oops: 0000 [#1] SMP NOPTI CPU: 15 UID: 0 PID: 658 Comm: bash Tainted: 6.19.0-rc6-next-2026012 Tainted: [O]=OOT_MODULE Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), RIP: 0010:strcmp+0x10/0x30 RSP: 0018:ffffc900017f7dc0 EFLAGS: 00000246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff888107cd4358 RDX: 0000000019f73907 RSI: ffffffff82cc381a RDI: 0000000000000000 RBP: ffff8881016bef0d R08: 000000006c0e7145 R09: 0000000056c0e714 R10: 0000000000000001 R11: ffff888107cd4358 R12: 0007ffffffffffff R13: ffff888101399200 R14: ffff888100fcb360 R15: 0007ffffffffffff CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000000105c79000 CR4: 00000000000006f0 Call Trace: <TASK> dmemcg_limit_write.constprop.0+0x16d/0x390 ? __pfx_set_resource_max+0x10/0x10 kernfs_fop_write_iter+0x14e/0x200 vfs_write+0x367/0x510 ksys_write+0x66/0xe0 do_syscall_64+0x6b/0x390 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7f42697e1887 It was trriggered setting max without limitation, the command is like: "echo test/region0 > dmem.max". To fix this issue, add check whether options is valid after parsing the region_name.
- https://ubuntu.com/security/CVE-2026-23183 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-23183 Third Party Advisory
- https://git.kernel.org/linus/43151f812886be1855d2cba059f9c93e4729460b Third Party Advisory
- https://git.kernel.org/stable/c/43151f812886be1855d2cba059f9c93e4729460b Third Party Advisory
- https://git.kernel.org/stable/c/c13816e8fa23deec6a8d7465d9e637fd02683b5c Third Party Advisory
Published: 14 Feb 2026 · Updated: 13 Mar 2026 · First seen: 9 Mar 2026