CVE-2026-23144

N/A Unknown

📋 TL;DR

A memory leak vulnerability in the Linux kernel's DAMON sysfs interface occurs when context directory setup fails after attrs/ subdirectories have been created. This causes the system to retain orphaned directories until reboot, potentially degrading system performance and stability. All Linux systems using the DAMON memory monitoring subsystem are affected.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions with DAMON sysfs support (specific affected versions not specified in CVE, but likely 5.15+ where DAMON sysfs was introduced)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with DAMON sysfs interface enabled/used. Most systems have this compiled in modern kernels.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

System memory exhaustion leading to kernel panic or system instability, potentially causing denial of service and requiring reboot to resolve.

🟠

Likely Case

Gradual memory leak over time that degrades system performance and may eventually cause out-of-memory conditions for critical processes.

🟢

If Mitigated

Minor performance impact with no security compromise if system has sufficient memory headroom and regular reboots.

🌐 Internet-Facing: LOW - This is a local kernel interface issue requiring local access to trigger.
🏢 Internal Only: MEDIUM - While requiring local access, it could be exploited by malicious insiders or through other local privilege escalation vectors.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to trigger DAMON sysfs context creation failures. No remote exploitation possible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patched in kernel commits referenced in CVE (specific stable versions not specified)

Vendor Advisory: https://git.kernel.org/stable/c/43964644348f6b1add3055c4a6cae8f77d892a6e

Restart Required: No

Instructions:

1. Update Linux kernel to version containing fixes from provided git commits. 2. For distributions: Use package manager to update kernel package. 3. For custom kernels: Apply patches from git.kernel.org references and rebuild.

🔧 Temporary Workarounds

Disable DAMON sysfs interface

Linux

Prevent access to vulnerable interface by disabling DAMON sysfs support

echo 'kernel.damon.sysfs = 0' >> /etc/sysctl.conf
sysctl -p

🧯 If You Can't Patch

  • Implement regular system reboots to clear accumulated memory leaks
  • Monitor system memory usage closely and alert on unusual patterns

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if DAMON sysfs is enabled: 'uname -r' and check for /sys/kernel/mm/damon/ directory existence

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated beyond commit dates in CVE references, and test DAMON sysfs operations don't leak directories

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages related to memory allocation failures
  • System logs showing out-of-memory conditions

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("out of memory" OR "OOM" OR "memory allocation failure")

🔗 References

📤 Share & Export