Home

Description

In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs: catch commit test ctx alloc failure Patch series "mm/damon/sysfs: fix commit test damon_ctx [de]allocation". DAMON sysfs interface dynamically allocates and uses a damon_ctx object for testing if given inputs for online DAMON parameters update is valid. The object is being used without an allocation failure check, and leaked when the test succeeds. Fix the two bugs. This patch (of 2): The damon_ctx for testing online DAMON parameters commit inputs is used without its allocation failure check. This could result in an invalid memory access. Fix it by directly returning an error when the allocation failed.

PUBLISHED Reserved 2025-04-16 | Published 2025-12-04 | Updated 2025-12-04 | Assigner Linux

Product status

Default status
unaffected

4c9ea539ad59ec60676930dacee02b7adde2e0c0 (git) before 5b3609d9b9650bdea0bfdf643e0ce57e1aed67fc
affected

4c9ea539ad59ec60676930dacee02b7adde2e0c0 (git) before f0c5118ebb0eb7e4fd6f0d2ace3315ca141b317f
affected

Default status
affected

6.15
affected

Any version before 6.15
unaffected

6.17.6 (semver)
unaffected

6.18 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/5b3609d9b9650bdea0bfdf643e0ce57e1aed67fc

git.kernel.org/...c/f0c5118ebb0eb7e4fd6f0d2ace3315ca141b317f

cve.org (CVE-2025-40228)

nvd.nist.gov (CVE-2025-40228)