CVE-2026-23144
Memory Leak in Linux Kernel DAMON sysfs on Setup Failure
Publication date: 2026-02-14
Last updated on: 2026-03-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.13 (inc) to 6.18.7 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.2 (inc) to 6.6.122 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.67 (exc) |
| linux | linux_kernel | From 5.18 (inc) to 6.1.162 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's DAMON sysfs interface. When the system attempts to set up a context DAMON sysfs directory and the setup fails after creating the attrs/ directory, the subdirectories inside attrs/ are not properly cleaned up.
As a result, the DAMON sysfs interface becomes nearly broken until the system is rebooted, and memory allocated for the unremoved directories is leaked.
The fix involves cleaning up these directories properly when such setup failures occur.
How can this vulnerability impact me? :
This vulnerability can cause the DAMON sysfs interface to become nearly unusable until the system is rebooted.
Additionally, it causes a memory leak due to unremoved directories, which could degrade system performance or stability over time if the issue occurs repeatedly without rebooting.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know