Home

Description

In the Linux kernel, the following vulnerability has been resolved: mm/damon/stat: deallocate damon_call() failure leaking damon_ctx damon_stat_start() always allocates the module's damon_ctx object (damon_stat_context). Meanwhile, if damon_call() in the function fails, the damon_ctx object is not deallocated. Hence, if the damon_call() is failed, and the user writes Y to “enabled” again, the previously allocated damon_ctx object is leaked. This cannot simply be fixed by deallocating the damon_ctx object when damon_call() fails. That's because damon_call() failure doesn't guarantee the kdamond main function, which accesses the damon_ctx object, is completely finished. In other words, if damon_stat_start() deallocates the damon_ctx object after damon_call() failure, the not-yet-terminated kdamond could access the freed memory (use-after-free). Fix the leak while avoiding the use-after-free by keeping returning damon_stat_start() without deallocating the damon_ctx object after damon_call() failure, but deallocating it when the function is invoked again and the kdamond is completely terminated. If the kdamond is not yet terminated, simply return -EAGAIN, as the kdamond will soon be terminated. The issue was discovered [1] by sashiko.

PUBLISHED Reserved 2026-03-09 | Published 2026-04-24 | Updated 2026-04-24 | Assigner Linux

Product status

Default status
unaffected

405f61996d9d2e9d497cd9f6b66f41dc28d3d1d8 (git) before 447f8870b484f6596d7a7130e72bd0a3f1e037bb
affected

405f61996d9d2e9d497cd9f6b66f41dc28d3d1d8 (git) before 16c92e9bf55fa049ddb5e894dc0623dacd46a620
affected

405f61996d9d2e9d497cd9f6b66f41dc28d3d1d8 (git) before 4c04c6b47c361612b1d70cec8f7a60b1482d1400
affected

Default status
affected

6.17
affected

Any version before 6.17
unaffected

6.18.23 (semver)
unaffected

6.19.13 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/447f8870b484f6596d7a7130e72bd0a3f1e037bb

git.kernel.org/...c/16c92e9bf55fa049ddb5e894dc0623dacd46a620

git.kernel.org/...c/4c04c6b47c361612b1d70cec8f7a60b1482d1400

cve.org (CVE-2026-31652)

nvd.nist.gov (CVE-2026-31652)

Download JSON