CVE-2026-23164

Source
https://cve.org/CVERecord?id=CVE-2026-23164
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23164.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-23164
Downstream
Published
2026-02-14T16:01:28.624Z
Modified
2026-05-07T04:16:47.223130Z
Summary
rocker: fix memory leak in rocker_world_port_post_fini()
Details

In the Linux kernel, the following vulnerability has been resolved:

rocker: fix memory leak in rockerworldportpostfini()

In rockerworldportpreinit(), rockerport->wpriv is allocated with kzalloc(wops->portprivsize, GFPKERNEL). However, in rockerworldportpostfini(), the memory is only freed when wops->portpostfini callback is set:

if (!wops->port_post_fini)
    return;
wops->port_post_fini(rocker_port);
kfree(rocker_port->wpriv);

Since rockerofdpaops does not implement portpostfini callback (it is NULL), the wpriv memory allocated for each port is never freed when ports are removed. This leads to a memory leak of sizeof(struct ofdpa_port) bytes per port on every device removal.

Fix this by always calling kfree(rockerport->wpriv) regardless of whether the portpost_fini callback exists.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23164.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e420114eef4a3a5025a243b89b0dc343101e3d3c
Fixed
2a3a64d75d2d0727da285749476761ebcad557a3
Fixed
b11e6f926480ab0939fec44781f28558c54be4e7
Fixed
8ce2e85889939c02740b4245301aa5c35fc94887
Fixed
d448bf96889f1905e740c554780f5c9fa0440566
Fixed
d8723917efda3b4f4c3de78d1ec1e1af015c0be1
Fixed
dce375f4afc348c310d171abcde7ec1499a4c26a
Fixed
8d7ba71e46216b8657a82ca2ec118bc93812a4d0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23164.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.6.0
Fixed
5.10.249
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.199
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.162
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.123
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.69
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23164.json"