CVE-2026-31390
Received Received - Intake
Memory Leak in Linux Kernel drm/xe Component Fixed

Publication date: 2026-04-03

Last updated on: 2026-04-03

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: drm/xe: Fix memory leak in xe_vm_madvise_ioctl When check_bo_args_are_sane() validation fails, jump to the new free_vmas cleanup label to properly free the allocated resources. This ensures proper cleanup in this error path. (cherry picked from commit 29bd06faf727a4b76663e4be0f7d770e2d2a7965)
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-03
Last Modified
2026-04-03
Generated
2026-05-07
AI Q&A
2026-04-03
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a memory leak in the Linux kernel's drm/xe component, specifically in the xe_vm_madvise_ioctl function.

The issue occurs when the function check_bo_args_are_sane() fails validation. In this error path, allocated resources were not properly freed, leading to a memory leak.

The fix involves jumping to a new cleanup label called free_vmas to ensure that allocated resources are properly freed when validation fails.


How can this vulnerability impact me? :

A memory leak in the kernel can lead to increased memory usage over time, potentially causing system instability or degraded performance.

If exploited or triggered repeatedly, it could exhaust system memory resources, possibly leading to crashes or denial of service conditions.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart