CVE-2026-23164

In the Linux kernel, the following vulnerability has been resolved: rocker: fix memory leak in rocker_world_port_post_fini() In rocker_world_port_pre_init(), rocker_port->wpriv is allocated with kzalloc(wops->port_priv_size, GFP_KERNEL). However, in rocker_world_port_post_fini(), the memory is only freed when wops->port_post_fini callback is set: if (!wops->port_post_fini) return; wops->port_post_fini(rocker_port); kfree(rocker_port->wpriv); Since rocker_ofdpa_ops does not implement port_post_fini callback (it is NULL), the wpriv memory allocated for each port is never freed when ports are removed. This leads to a memory leak of sizeof(struct ofdpa_port) bytes per port on every device removal. Fix this by always calling kfree(rocker_port->wpriv) regardless of whether the port_post_fini callback exists.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc7:*:*:*:*:*:*

History

18 Mar 2026, 15:03

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc7:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CWE CWE-401
References () https://git.kernel.org/stable/c/2a3a64d75d2d0727da285749476761ebcad557a3 - () https://git.kernel.org/stable/c/2a3a64d75d2d0727da285749476761ebcad557a3 - Patch
References () https://git.kernel.org/stable/c/8ce2e85889939c02740b4245301aa5c35fc94887 - () https://git.kernel.org/stable/c/8ce2e85889939c02740b4245301aa5c35fc94887 - Patch
References () https://git.kernel.org/stable/c/8d7ba71e46216b8657a82ca2ec118bc93812a4d0 - () https://git.kernel.org/stable/c/8d7ba71e46216b8657a82ca2ec118bc93812a4d0 - Patch
References () https://git.kernel.org/stable/c/b11e6f926480ab0939fec44781f28558c54be4e7 - () https://git.kernel.org/stable/c/b11e6f926480ab0939fec44781f28558c54be4e7 - Patch
References () https://git.kernel.org/stable/c/d448bf96889f1905e740c554780f5c9fa0440566 - () https://git.kernel.org/stable/c/d448bf96889f1905e740c554780f5c9fa0440566 - Patch
References () https://git.kernel.org/stable/c/d8723917efda3b4f4c3de78d1ec1e1af015c0be1 - () https://git.kernel.org/stable/c/d8723917efda3b4f4c3de78d1ec1e1af015c0be1 - Patch
References () https://git.kernel.org/stable/c/dce375f4afc348c310d171abcde7ec1499a4c26a - () https://git.kernel.org/stable/c/dce375f4afc348c310d171abcde7ec1499a4c26a - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

18 Feb 2026, 17:52

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta: rocker: corregir fuga de memoria en rocker_world_port_post_fini() En rocker_world_port_pre_init(), rocker_port->wpriv se asigna con kzalloc(wops->port_priv_size, GFP_KERNEL). Sin embargo, en rocker_world_port_post_fini(), la memoria solo se libera cuando la devolución de llamada wops->port_post_fini está establecida: si (!wops->port_post_fini) retornar; wops->port_post_fini(rocker_port); kfree(rocker_port->wpriv); Dado que rocker_ofdpa_ops no implementa la devolución de llamada port_post_fini (es NULL), la memoria wpriv asignada para cada puerto nunca se libera cuando se eliminan los puertos. Esto conduce a una fuga de memoria de sizeof(struct ofdpa_port) bytes por puerto en cada eliminación de dispositivo. Solucione esto llamando siempre a kfree(rocker_port->wpriv) independientemente de si existe la devolución de llamada port_post_fini.

14 Feb 2026, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-14 16:15

Updated : 2026-03-18 15:03


NVD link : CVE-2026-23164

Mitre link : CVE-2026-23164

CVE.ORG link : CVE-2026-23164


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime