CVE-2026-31459
Description
In the Linux kernel, the following vulnerability has been resolved:
mm/damon/sysfs: fix param_ctx leak on damon_sysfs_new_test_ctx() failure
Patch series "mm/damon/sysfs: fix memory leak and NULL dereference issues", v4.
DAMON_SYSFS can leak memory under allocation failure, and do NULL pointer dereference when a privileged user make wrong sequences of control. Fix those.
This patch (of 3):
When damon_sysfs_new_test_ctx() fails in damon_sysfs_commit_input(), param_ctx is leaked because the early return skips the cleanup at the out label. Destroy param_ctx before returning.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A memory leak in the Linux kernel's DAMON sysfs interface occurs when damon_sysfs_new_test_ctx() fails, leaking param_ctx.
Vulnerability
In the Linux kernel's DAMON (Data Access Monitoring) sysfs interface, a memory leak vulnerability exists in the damon_sysfs_commit_input() function. When damon_sysfs_new_test_ctx() fails, the param_ctx variable is not freed because the error path returns early without reaching the cleanup label. This leads to a memory leak [1][2][3].
Exploitation
The vulnerability can be triggered by a privileged user (since sysfs operations require root) by causing an allocation failure in damon_sysfs_new_test_ctx(). This could be achieved by exhausting memory or other resource constraints. The attack surface is local, requiring access to the sysfs interface for DAMON.
Impact
An attacker with sufficient privileges could repeatedly trigger this leak, leading to memory exhaustion and potential denial of service. The CVSS score is 5.5 (Medium), indicating a moderate severity.
Mitigation
The fix is included in the Linux kernel stable updates as commits [1][2][3] (part of a patch series). Users should apply the latest stable kernel updates to remediate this issue.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
14cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 12 more
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=6.18.1,<6.18.21
- cpe:2.3:o:linux:linux_kernel:6.17.6:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.18:-:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.18:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.18:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.18:rc5:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.18:rc6:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.18:rc7:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.