CVE-2026-23160 (GCVE-0-2026-23160)

Vulnerability from cvelistv5 – Published: 2026-02-14 16:01 – Updated: 2026-02-14 16:01
VLAI?
Title
octeon_ep: Fix memory leak in octep_device_setup()
Summary
In the Linux kernel, the following vulnerability has been resolved: octeon_ep: Fix memory leak in octep_device_setup() In octep_device_setup(), if octep_ctrl_net_init() fails, the function returns directly without unmapping the mapped resources and freeing the allocated configuration memory. Fix this by jumping to the unsupported_dev label, which performs the necessary cleanup. This aligns with the error handling logic of other paths in this function. Compile tested only. Issue found using a prototype static analysis tool and code review.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: 577f0d1b1c5f3282fa2011177b0af692a7c21aee , < 5058d3f8f17202e673f90af1446252322bd0850f (git)
Affected: 577f0d1b1c5f3282fa2011177b0af692a7c21aee , < fdfd28e13c244d7c3345e74f339fd1b67605b694 (git)
Affected: 577f0d1b1c5f3282fa2011177b0af692a7c21aee , < d753f3c3f9d7a6e6dbb4d3a97b73007d71624551 (git)
Affected: 577f0d1b1c5f3282fa2011177b0af692a7c21aee , < 8016dc5ee19a77678c264f8ba368b1e873fa705b (git)
Create a notification for this product.
    Linux Linux Affected: 6.4
Unaffected: 0 , < 6.4 (semver)
Unaffected: 6.6.123 , ≤ 6.6.* (semver)
Unaffected: 6.12.69 , ≤ 6.12.* (semver)
Unaffected: 6.18.9 , ≤ 6.18.* (semver)
Unaffected: 6.19 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/ethernet/marvell/octeon_ep/octep_main.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "5058d3f8f17202e673f90af1446252322bd0850f",
              "status": "affected",
              "version": "577f0d1b1c5f3282fa2011177b0af692a7c21aee",
              "versionType": "git"
            },
            {
              "lessThan": "fdfd28e13c244d7c3345e74f339fd1b67605b694",
              "status": "affected",
              "version": "577f0d1b1c5f3282fa2011177b0af692a7c21aee",
              "versionType": "git"
            },
            {
              "lessThan": "d753f3c3f9d7a6e6dbb4d3a97b73007d71624551",
              "status": "affected",
              "version": "577f0d1b1c5f3282fa2011177b0af692a7c21aee",
              "versionType": "git"
            },
            {
              "lessThan": "8016dc5ee19a77678c264f8ba368b1e873fa705b",
              "status": "affected",
              "version": "577f0d1b1c5f3282fa2011177b0af692a7c21aee",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/ethernet/marvell/octeon_ep/octep_main.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.4"
            },
            {
              "lessThan": "6.4",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.123",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.69",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.18.*",
              "status": "unaffected",
              "version": "6.18.9",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.19",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.123",
                  "versionStartIncluding": "6.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.69",
                  "versionStartIncluding": "6.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.18.9",
                  "versionStartIncluding": "6.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.19",
                  "versionStartIncluding": "6.4",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteon_ep: Fix memory leak in octep_device_setup()\n\nIn octep_device_setup(), if octep_ctrl_net_init() fails, the function\nreturns directly without unmapping the mapped resources and freeing the\nallocated configuration memory.\n\nFix this by jumping to the unsupported_dev label, which performs the\nnecessary cleanup. This aligns with the error handling logic of other\npaths in this function.\n\nCompile tested only. Issue found using a prototype static analysis tool\nand code review."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-14T16:01:25.900Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/5058d3f8f17202e673f90af1446252322bd0850f"
        },
        {
          "url": "https://git.kernel.org/stable/c/fdfd28e13c244d7c3345e74f339fd1b67605b694"
        },
        {
          "url": "https://git.kernel.org/stable/c/d753f3c3f9d7a6e6dbb4d3a97b73007d71624551"
        },
        {
          "url": "https://git.kernel.org/stable/c/8016dc5ee19a77678c264f8ba368b1e873fa705b"
        }
      ],
      "title": "octeon_ep: Fix memory leak in octep_device_setup()",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2026-23160",
    "datePublished": "2026-02-14T16:01:25.900Z",
    "dateReserved": "2026-01-13T15:37:45.979Z",
    "dateUpdated": "2026-02-14T16:01:25.900Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2026-23160\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-02-14T16:15:56.177\",\"lastModified\":\"2026-02-18T17:52:44.520\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nocteon_ep: Fix memory leak in octep_device_setup()\\n\\nIn octep_device_setup(), if octep_ctrl_net_init() fails, the function\\nreturns directly without unmapping the mapped resources and freeing the\\nallocated configuration memory.\\n\\nFix this by jumping to the unsupported_dev label, which performs the\\nnecessary cleanup. This aligns with the error handling logic of other\\npaths in this function.\\n\\nCompile tested only. Issue found using a prototype static analysis tool\\nand code review.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\\n\\nocteon_ep: Correcci\u00f3n de fuga de memoria en octep_device_setup()\\n\\nEn octep_device_setup(), si octep_ctrl_net_init() falla, la funci\u00f3n retorna directamente sin desmapear los recursos mapeados y liberar la memoria de configuraci\u00f3n asignada.\\n\\nEsto se corrige saltando a la etiqueta unsupported_dev, la cual realiza la limpieza necesaria. Esto se alinea con la l\u00f3gica de manejo de errores de otras rutas en esta funci\u00f3n.\\n\\nProbado \u00fanicamente en compilaci\u00f3n. Problema encontrado usando una herramienta prototipo de an\u00e1lisis est\u00e1tico y revisi\u00f3n de c\u00f3digo.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/5058d3f8f17202e673f90af1446252322bd0850f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8016dc5ee19a77678c264f8ba368b1e873fa705b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d753f3c3f9d7a6e6dbb4d3a97b73007d71624551\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/fdfd28e13c244d7c3345e74f339fd1b67605b694\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…