CVE-2026-23164

NameCVE-2026-23164
DescriptionIn the Linux kernel, the following vulnerability has been resolved: rocker: fix memory leak in rocker_world_port_post_fini() In rocker_world_port_pre_init(), rocker_port->wpriv is allocated with kzalloc(wops->port_priv_size, GFP_KERNEL). However, in rocker_world_port_post_fini(), the memory is only freed when wops->port_post_fini callback is set: if (!wops->port_post_fini) return; wops->port_post_fini(rocker_port); kfree(rocker_port->wpriv); Since rocker_ofdpa_ops does not implement port_post_fini callback (it is NULL), the wpriv memory allocated for each port is never freed when ports are removed. This leads to a memory leak of sizeof(struct ofdpa_port) bytes per port on every device removal. Fix this by always calling kfree(rocker_port->wpriv) regardless of whether the port_post_fini callback exists.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
linux (PTS)bullseye5.10.223-1vulnerable
bullseye (security)5.10.249-1fixed
bookworm6.1.159-1vulnerable
bookworm (security)6.1.162-1fixed
trixie6.12.63-1vulnerable
trixie (security)6.12.69-1fixed
forky6.18.9-1fixed
sid6.18.10-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
linuxsourcebullseye5.10.249-1
linuxsourcebookworm6.1.162-1
linuxsourcetrixie6.12.69-1
linuxsource(unstable)6.18.9-1

Notes

https://git.kernel.org/linus/8d7ba71e46216b8657a82ca2ec118bc93812a4d0 (6.19-rc8)

Search for package or bug name: Reporting problems