VYPR
Medium severity5.5NVD Advisory· Published Apr 22, 2026· Updated May 6, 2026

CVE-2026-31459

CVE-2026-31459

Description

In the Linux kernel, the following vulnerability has been resolved:

mm/damon/sysfs: fix param_ctx leak on damon_sysfs_new_test_ctx() failure

Patch series "mm/damon/sysfs: fix memory leak and NULL dereference issues", v4.

DAMON_SYSFS can leak memory under allocation failure, and do NULL pointer dereference when a privileged user make wrong sequences of control. Fix those.

This patch (of 3):

When damon_sysfs_new_test_ctx() fails in damon_sysfs_commit_input(), param_ctx is leaked because the early return skips the cleanup at the out label. Destroy param_ctx before returning.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A memory leak in the Linux kernel's DAMON sysfs interface occurs when damon_sysfs_new_test_ctx() fails, leaking param_ctx.

Vulnerability

In the Linux kernel's DAMON (Data Access Monitoring) sysfs interface, a memory leak vulnerability exists in the damon_sysfs_commit_input() function. When damon_sysfs_new_test_ctx() fails, the param_ctx variable is not freed because the error path returns early without reaching the cleanup label. This leads to a memory leak [1][2][3].

Exploitation

The vulnerability can be triggered by a privileged user (since sysfs operations require root) by causing an allocation failure in damon_sysfs_new_test_ctx(). This could be achieved by exhausting memory or other resource constraints. The attack surface is local, requiring access to the sysfs interface for DAMON.

Impact

An attacker with sufficient privileges could repeatedly trigger this leak, leading to memory exhaustion and potential denial of service. The CVSS score is 5.5 (Medium), indicating a moderate severity.

Mitigation

The fix is included in the Linux kernel stable updates as commits [1][2][3] (part of a patch series). Users should apply the latest stable kernel updates to remediate this issue.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

14
  • Linux/Kernel13 versions
    cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 12 more
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=6.18.1,<6.18.21
    • cpe:2.3:o:linux:linux_kernel:6.17.6:*:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:6.18:-:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:6.18:rc3:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:6.18:rc4:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:6.18:rc5:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:6.18:rc6:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:6.18:rc7:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.