CVE-2026-23164
📋 TL;DR
A memory leak vulnerability exists in the Linux kernel's rocker driver where allocated memory for port private data is not properly freed when ports are removed. This affects systems using the rocker network switch driver, potentially leading to gradual memory exhaustion over time. The vulnerability requires local access to trigger.
💻 Affected Systems
- Linux kernel with rocker driver enabled
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Continuous memory exhaustion leading to system instability, denial of service, or kernel panic if many port creation/removal cycles occur.
Likely Case
Gradual memory consumption over time during normal network operations, potentially causing performance degradation.
If Mitigated
Minimal impact with proper monitoring and regular system maintenance.
🎯 Exploit Status
Requires local access and ability to trigger port creation/removal operations. Not a remote code execution vulnerability.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Linux kernel with commits 2a3a64d75d2d0727da285749476761ebcad557a3 or later
Vendor Advisory: https://git.kernel.org/stable/c/2a3a64d75d2d0727da285749476761ebcad557a3
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix commit. 2. Reboot system to load new kernel. 3. Verify rocker driver is updated.
🔧 Temporary Workarounds
Disable rocker driver
allUnload or prevent loading of the vulnerable rocker driver module
rmmod rocker
echo 'blacklist rocker' > /etc/modprobe.d/blacklist-rocker.conf
Limit port operations
allRestrict user/process access to network port management operations
🧯 If You Can't Patch
- Monitor system memory usage for unusual growth patterns
- Restrict local user access to systems using rocker driver
- Implement regular system reboots to clear accumulated memory
🔍 How to Verify
Check if Vulnerable:
Check if rocker module is loaded: lsmod | grep rocker. Check kernel version against patched versions.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes fix commit: grep -q '2a3a64d75d2d0727da285749476761ebcad557a3' /proc/version_signature (if available) or check kernel source.
📡 Detection & Monitoring
Log Indicators:
- Kernel oom-killer messages
- Increasing memory usage in system logs
- Kernel panic logs related to memory exhaustion
Network Indicators:
- Unusual network port creation/removal activity
SIEM Query:
source="kernel" AND ("out of memory" OR "oom-killer" OR "memory allocation failure")
🔗 References
- https://git.kernel.org/stable/c/2a3a64d75d2d0727da285749476761ebcad557a3
- https://git.kernel.org/stable/c/8ce2e85889939c02740b4245301aa5c35fc94887
- https://git.kernel.org/stable/c/8d7ba71e46216b8657a82ca2ec118bc93812a4d0
- https://git.kernel.org/stable/c/b11e6f926480ab0939fec44781f28558c54be4e7
- https://git.kernel.org/stable/c/d448bf96889f1905e740c554780f5c9fa0440566
- https://git.kernel.org/stable/c/d8723917efda3b4f4c3de78d1ec1e1af015c0be1
- https://git.kernel.org/stable/c/dce375f4afc348c310d171abcde7ec1499a4c26a