CVE-2026-23160 (GCVE-0-2026-23160)
Vulnerability from cvelistv5 – Published: 2026-02-14 16:01 – Updated: 2026-02-14 16:01
VLAI?
Title
octeon_ep: Fix memory leak in octep_device_setup()
Summary
In the Linux kernel, the following vulnerability has been resolved:
octeon_ep: Fix memory leak in octep_device_setup()
In octep_device_setup(), if octep_ctrl_net_init() fails, the function
returns directly without unmapping the mapped resources and freeing the
allocated configuration memory.
Fix this by jumping to the unsupported_dev label, which performs the
necessary cleanup. This aligns with the error handling logic of other
paths in this function.
Compile tested only. Issue found using a prototype static analysis tool
and code review.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
577f0d1b1c5f3282fa2011177b0af692a7c21aee , < 5058d3f8f17202e673f90af1446252322bd0850f
(git)
Affected: 577f0d1b1c5f3282fa2011177b0af692a7c21aee , < fdfd28e13c244d7c3345e74f339fd1b67605b694 (git) Affected: 577f0d1b1c5f3282fa2011177b0af692a7c21aee , < d753f3c3f9d7a6e6dbb4d3a97b73007d71624551 (git) Affected: 577f0d1b1c5f3282fa2011177b0af692a7c21aee , < 8016dc5ee19a77678c264f8ba368b1e873fa705b (git) |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/net/ethernet/marvell/octeon_ep/octep_main.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "5058d3f8f17202e673f90af1446252322bd0850f",
"status": "affected",
"version": "577f0d1b1c5f3282fa2011177b0af692a7c21aee",
"versionType": "git"
},
{
"lessThan": "fdfd28e13c244d7c3345e74f339fd1b67605b694",
"status": "affected",
"version": "577f0d1b1c5f3282fa2011177b0af692a7c21aee",
"versionType": "git"
},
{
"lessThan": "d753f3c3f9d7a6e6dbb4d3a97b73007d71624551",
"status": "affected",
"version": "577f0d1b1c5f3282fa2011177b0af692a7c21aee",
"versionType": "git"
},
{
"lessThan": "8016dc5ee19a77678c264f8ba368b1e873fa705b",
"status": "affected",
"version": "577f0d1b1c5f3282fa2011177b0af692a7c21aee",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/net/ethernet/marvell/octeon_ep/octep_main.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.4"
},
{
"lessThan": "6.4",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"version": "6.6.123",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.12.*",
"status": "unaffected",
"version": "6.12.69",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.18.*",
"status": "unaffected",
"version": "6.18.9",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.19",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.123",
"versionStartIncluding": "6.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.69",
"versionStartIncluding": "6.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18.9",
"versionStartIncluding": "6.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.19",
"versionStartIncluding": "6.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteon_ep: Fix memory leak in octep_device_setup()\n\nIn octep_device_setup(), if octep_ctrl_net_init() fails, the function\nreturns directly without unmapping the mapped resources and freeing the\nallocated configuration memory.\n\nFix this by jumping to the unsupported_dev label, which performs the\nnecessary cleanup. This aligns with the error handling logic of other\npaths in this function.\n\nCompile tested only. Issue found using a prototype static analysis tool\nand code review."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-14T16:01:25.900Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/5058d3f8f17202e673f90af1446252322bd0850f"
},
{
"url": "https://git.kernel.org/stable/c/fdfd28e13c244d7c3345e74f339fd1b67605b694"
},
{
"url": "https://git.kernel.org/stable/c/d753f3c3f9d7a6e6dbb4d3a97b73007d71624551"
},
{
"url": "https://git.kernel.org/stable/c/8016dc5ee19a77678c264f8ba368b1e873fa705b"
}
],
"title": "octeon_ep: Fix memory leak in octep_device_setup()",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2026-23160",
"datePublished": "2026-02-14T16:01:25.900Z",
"dateReserved": "2026-01-13T15:37:45.979Z",
"dateUpdated": "2026-02-14T16:01:25.900Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2026-23160\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-02-14T16:15:56.177\",\"lastModified\":\"2026-02-18T17:52:44.520\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nocteon_ep: Fix memory leak in octep_device_setup()\\n\\nIn octep_device_setup(), if octep_ctrl_net_init() fails, the function\\nreturns directly without unmapping the mapped resources and freeing the\\nallocated configuration memory.\\n\\nFix this by jumping to the unsupported_dev label, which performs the\\nnecessary cleanup. This aligns with the error handling logic of other\\npaths in this function.\\n\\nCompile tested only. Issue found using a prototype static analysis tool\\nand code review.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\\n\\nocteon_ep: Correcci\u00f3n de fuga de memoria en octep_device_setup()\\n\\nEn octep_device_setup(), si octep_ctrl_net_init() falla, la funci\u00f3n retorna directamente sin desmapear los recursos mapeados y liberar la memoria de configuraci\u00f3n asignada.\\n\\nEsto se corrige saltando a la etiqueta unsupported_dev, la cual realiza la limpieza necesaria. Esto se alinea con la l\u00f3gica de manejo de errores de otras rutas en esta funci\u00f3n.\\n\\nProbado \u00fanicamente en compilaci\u00f3n. Problema encontrado usando una herramienta prototipo de an\u00e1lisis est\u00e1tico y revisi\u00f3n de c\u00f3digo.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/5058d3f8f17202e673f90af1446252322bd0850f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8016dc5ee19a77678c264f8ba368b1e873fa705b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d753f3c3f9d7a6e6dbb4d3a97b73007d71624551\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/fdfd28e13c244d7c3345e74f339fd1b67605b694\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…