Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-23026
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-31 Jan, 2026 | 11:42
Updated At-11 May, 2026 | 21:58
Rejected At-
▼CVE Numbering Authority (CNA)
dmaengine: qcom: gpi: Fix memory leak in gpi_peripheral_config()

In the Linux kernel, the following vulnerability has been resolved: dmaengine: qcom: gpi: Fix memory leak in gpi_peripheral_config() Fix a memory leak in gpi_peripheral_config() where the original memory pointed to by gchan->config could be lost if krealloc() fails. The issue occurs when: 1. gchan->config points to previously allocated memory 2. krealloc() fails and returns NULL 3. The function directly assigns NULL to gchan->config, losing the reference to the original memory 4. The original memory becomes unreachable and cannot be freed Fix this by using a temporary variable to hold the krealloc() result and only updating gchan->config when the allocation succeeds. Found via static analysis and code review.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/dma/qcom/gpi.c
Default Status
unaffected
Versions
Affected
  • From 5d0c3533a19f48e5e7e73806a3e4b29cd4364130 before 4532f18e4ab36def1f55cd936d0fc002b2ce34c2 (git)
  • From 5d0c3533a19f48e5e7e73806a3e4b29cd4364130 before 694ab1f6f16cb69f7c5ef2452b22ba7b00a3c7c7 (git)
  • From 5d0c3533a19f48e5e7e73806a3e4b29cd4364130 before 6bf4ef078fd11910988889a6c0b3698d2e0c89af (git)
  • From 5d0c3533a19f48e5e7e73806a3e4b29cd4364130 before 01b1d781394fc9b83015e3a3cd46b17bda842bd8 (git)
  • From 5d0c3533a19f48e5e7e73806a3e4b29cd4364130 before 55a67ba5ac4cebfd54cc8305d4d57a0f1dfe6a85 (git)
  • From 5d0c3533a19f48e5e7e73806a3e4b29cd4364130 before 3f747004bbd641131d9396d87b5d2d3d1e182728 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/dma/qcom/gpi.c
Default Status
affected
Versions
Affected
  • 5.11
Unaffected
  • From 0 before 5.11 (semver)
  • From 5.15.199 through 5.15.* (semver)
  • From 6.1.162 through 6.1.* (semver)
  • From 6.6.122 through 6.6.* (semver)
  • From 6.12.67 through 6.12.* (semver)
  • From 6.18.7 through 6.18.* (semver)
  • From 6.19 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/4532f18e4ab36def1f55cd936d0fc002b2ce34c2
N/A
https://git.kernel.org/stable/c/694ab1f6f16cb69f7c5ef2452b22ba7b00a3c7c7
N/A
https://git.kernel.org/stable/c/6bf4ef078fd11910988889a6c0b3698d2e0c89af
N/A
https://git.kernel.org/stable/c/01b1d781394fc9b83015e3a3cd46b17bda842bd8
N/A
https://git.kernel.org/stable/c/55a67ba5ac4cebfd54cc8305d4d57a0f1dfe6a85
N/A
https://git.kernel.org/stable/c/3f747004bbd641131d9396d87b5d2d3d1e182728
N/A
Hyperlink: https://git.kernel.org/stable/c/4532f18e4ab36def1f55cd936d0fc002b2ce34c2
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/694ab1f6f16cb69f7c5ef2452b22ba7b00a3c7c7
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/6bf4ef078fd11910988889a6c0b3698d2e0c89af
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/01b1d781394fc9b83015e3a3cd46b17bda842bd8
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/55a67ba5ac4cebfd54cc8305d4d57a0f1dfe6a85
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/3f747004bbd641131d9396d87b5d2d3d1e182728
Resource: N/A
Details not found