๐Ÿ” CVE Alert

CVE-2026-31653

UNKNOWN 0.0

mm/damon/sysfs: dealloc repeat_call_control if damon_call() fails

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs: dealloc repeat_call_control if damon_call() fails damon_call() for repeat_call_control of DAMON_SYSFS could fail if somehow the kdamond is stopped before the damon_call(). It could happen, for example, when te damon context was made for monitroing of a virtual address processes, and the process is terminated immediately, before the damon_call() invocation. In the case, the dyanmically allocated repeat_call_control is not deallocated and leaked. Fix the leak by deallocating the repeat_call_control under the damon_call() failure. This issue is discovered by sashiko [1].

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 24, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
04a06b139ec08aa63d7377f6d3e5218f8ddb1c5d < b9dadf026a9fb681ed32a0646adc10ab485bf3b1 04a06b139ec08aa63d7377f6d3e5218f8ddb1c5d < 0655f5cf1735508394ef8af98ddcfab3ac1c1cc5 04a06b139ec08aa63d7377f6d3e5218f8ddb1c5d < 0199390a6b92fc21860e1b858abf525c7e73b956
Linux / Linux
6.17

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/b9dadf026a9fb681ed32a0646adc10ab485bf3b1 git.kernel.org: https://git.kernel.org/stable/c/0655f5cf1735508394ef8af98ddcfab3ac1c1cc5 git.kernel.org: https://git.kernel.org/stable/c/0199390a6b92fc21860e1b858abf525c7e73b956