{"id":"CVE-2026-23164","summary":"rocker: fix memory leak in rocker_world_port_post_fini()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nrocker: fix memory leak in rocker_world_port_post_fini()\n\nIn rocker_world_port_pre_init(), rocker_port-\u003ewpriv is allocated with\nkzalloc(wops-\u003eport_priv_size, GFP_KERNEL). However, in\nrocker_world_port_post_fini(), the memory is only freed when\nwops-\u003eport_post_fini callback is set:\n\n    if (!wops-\u003eport_post_fini)\n        return;\n    wops-\u003eport_post_fini(rocker_port);\n    kfree(rocker_port-\u003ewpriv);\n\nSince rocker_ofdpa_ops does not implement port_post_fini callback\n(it is NULL), the wpriv memory allocated for each port is never freed\nwhen ports are removed. This leads to a memory leak of\nsizeof(struct ofdpa_port) bytes per port on every device removal.\n\nFix this by always calling kfree(rocker_port-\u003ewpriv) regardless of\nwhether the port_post_fini callback exists.","modified":"2026-03-20T12:47:25.892512Z","published":"2026-02-14T16:01:28.624Z","database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23164.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/2a3a64d75d2d0727da285749476761ebcad557a3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8ce2e85889939c02740b4245301aa5c35fc94887"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8d7ba71e46216b8657a82ca2ec118bc93812a4d0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b11e6f926480ab0939fec44781f28558c54be4e7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d448bf96889f1905e740c554780f5c9fa0440566"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d8723917efda3b4f4c3de78d1ec1e1af015c0be1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/dce375f4afc348c310d171abcde7ec1499a4c26a"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23164.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23164"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"e420114eef4a3a5025a243b89b0dc343101e3d3c"},{"fixed":"2a3a64d75d2d0727da285749476761ebcad557a3"},{"fixed":"b11e6f926480ab0939fec44781f28558c54be4e7"},{"fixed":"8ce2e85889939c02740b4245301aa5c35fc94887"},{"fixed":"d448bf96889f1905e740c554780f5c9fa0440566"},{"fixed":"d8723917efda3b4f4c3de78d1ec1e1af015c0be1"},{"fixed":"dce375f4afc348c310d171abcde7ec1499a4c26a"},{"fixed":"8d7ba71e46216b8657a82ca2ec118bc93812a4d0"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23164.json"}}],"schema_version":"1.7.5"}