Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-23026— dmaengine: qcom: gpi: Fix memory leak in gpi_peripheral_config()

EPSS 0.01% · P1
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-23026

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
dmaengine: qcom: gpi: Fix memory leak in gpi_peripheral_config()
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: dmaengine: qcom: gpi: Fix memory leak in gpi_peripheral_config() Fix a memory leak in gpi_peripheral_config() where the original memory pointed to by gchan->config could be lost if krealloc() fails. The issue occurs when: 1. gchan->config points to previously allocated memory 2. krealloc() fails and returns NULL 3. The function directly assigns NULL to gchan->config, losing the reference to the original memory 4. The original memory becomes unreachable and cannot be freed Fix this by using a temporary variable to hold the krealloc() result and only updating gchan->config when the allocation succeeds. Found via static analysis and code review.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于krealloc失败时未释放原始内存,可能导致内存泄漏。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 5d0c3533a19f48e5e7e73806a3e4b29cd4364130 ~ 4532f18e4ab36def1f55cd936d0fc002b2ce34c2 -
LinuxLinux 5.11 -

II. Public POCs for CVE-2026-23026

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-23026

登录查看更多情报信息。

Same Patch Batch · Linux · 2026-01-31 · 37 CVEs total

CVE-2026-23018btrfs: release path before initializing extent tree in btrfs_read_locked_inode()
CVE-2025-71186dmaengine: stm32: dmamux: fix device leak on route allocation
CVE-2025-71185dmaengine: ti: dma-crossbar: fix device leak on am335x route allocation
CVE-2026-23024idpf: fix memory leak of flow steer list on rmmod
CVE-2026-23023idpf: fix memory leak in idpf_vport_rel()
CVE-2026-23022idpf: fix memory leak in idpf_vc_core_deinit()
CVE-2026-23021net: usb: pegasus: fix memory leak in update_eth_regs_async()
CVE-2026-23020net: 3com: 3c59x: fix possible null dereference in vortex_probe1()
CVE-2026-23019net: marvell: prestera: fix NULL dereference on devlink_alloc() failure
CVE-2025-71187dmaengine: sh: rz-dmac: fix device leak on probe failure
CVE-2026-23017idpf: fix error handling in the init_task on load
CVE-2026-23016inet: frags: drop fraglist conntrack references
CVE-2026-23015gpio: mpsse: fix reference leak in gpio_mpsse_probe() error paths
CVE-2025-71184btrfs: fix NULL dereference on root when tracing inode eviction
CVE-2025-71183btrfs: always detect conflicting inodes when logging inode refs
CVE-2025-71182can: j1939: make j1939_session_activate() fail if device is no longer registered
CVE-2025-71181rust_binder: remove spin_lock() in rust_shrink_free_page()
CVE-2025-71180counter: interrupt-cnt: Drop IRQF_NO_THREAD flag
CVE-2026-23031can: gs_usb: gs_usb_receive_bulk_callback(): fix URB memory leak
CVE-2026-23039drm/gud: fix NULL fb and crtc dereferences on USB disconnect

Showing top 20 of 37 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2026-23026

No comments yet


Leave a comment