Bug 2461564 (CVE-2026-31653) - CVE-2026-31653 kernel: mm/damon/sysfs: dealloc repeat_call_control if damon_call() fails
Summary: CVE-2026-31653 kernel: mm/damon/sysfs: dealloc repeat_call_control if damon_c...
Keywords:
Status: NEW
Alias: CVE-2026-31653
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
unspecified
unspecified
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-04-24 15:08 UTC by OSIDB Bzimport
Modified: 2026-04-24 22:02 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-04-24 15:08:42 UTC
In the Linux kernel, the following vulnerability has been resolved:

mm/damon/sysfs: dealloc repeat_call_control if damon_call() fails

damon_call() for repeat_call_control of DAMON_SYSFS could fail if somehow
the kdamond is stopped before the damon_call().  It could happen, for
example, when te damon context was made for monitroing of a virtual
address processes, and the process is terminated immediately, before the
damon_call() invocation.  In the case, the dyanmically allocated
repeat_call_control is not deallocated and leaked.

Fix the leak by deallocating the repeat_call_control under the
damon_call() failure.

This issue is discovered by sashiko [1].


Note You need to log in before you can comment on or make changes to this bug.