CVE-2026-31445
Use-After-Free in Linux Kernel DAMON Context Causes Potential Crashes
Publication date: 2026-04-22
Last updated on: 2026-04-22
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's DAMON (Data Access Monitor) subsystem, specifically in the way it updates its context parameters using the damon_commit_ctx() function.
When damon_commit_ctx() is called to update DAMON parameters, it can fail due to invalid parameters or internal memory allocation failures. Although callers usually ensure parameters are valid to avoid failure, memory allocation failures can still occur.
If damon_commit_ctx() fails, the damon_ctx object being updated can become partially updated or corrupted. Despite this, the system might continue using this corrupted context, which can lead to unexpected behaviors, including potential NULL pointer dereferences.
The fix involves introducing a flag (maybe_corrupted) in the damon_ctx object to mark when a failure occurs. Subsequent operations check this flag and stop using the corrupted context to prevent further issues.
How can this vulnerability impact me? :
If this vulnerability is triggered, DAMON may operate with a partially updated or corrupted context, which can cause unexpected behaviors in the Linux kernel.
One possible impact is a NULL pointer dereference, which can lead to kernel crashes or system instability.
However, such failures due to memory allocation issues are considered rare in real-world scenarios, so the likelihood of impact is low but potentially severe if it occurs.
What immediate steps should I take to mitigate this vulnerability?
This vulnerability is related to the Linux kernel's DAMON subsystem and involves potential corruption of the damon_ctx object due to partial updates when memory allocation fails.
To mitigate this vulnerability, the recommended step is to update the Linux kernel to a version that includes the fix where the damon_commit_ctx() failure is properly handled by marking the damon_ctx as maybe_corrupted and preventing further use of a corrupted context.
Since the issue is fixed by kernel code changes, immediate mitigation involves applying the kernel patch or upgrading to a fixed kernel release.