CVE-2026-23142

Source
https://cve.org/CVERecord?id=CVE-2026-23142
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23142.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-23142
Downstream
Published
2026-02-14T15:36:08.147Z
Modified
2026-03-13T04:09:10.699576Z
Summary
mm/damon/sysfs-scheme: cleanup access_pattern subdirs on scheme dir setup failure
Details

In the Linux kernel, the following vulnerability has been resolved:

mm/damon/sysfs-scheme: cleanup access_pattern subdirs on scheme dir setup failure

When a DAMOS-scheme DAMON sysfs directory setup fails after setup of accesspattern/ directory, subdirectories of accesspattern/ directory are not cleaned up. As a result, DAMON sysfs interface is nearly broken until the system reboots, and the memory for the unremoved directory is leaked.

Cleanup the directories under such failures.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23142.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9bbb820a5bd5f406ae5e0819cc31f2c2e6f4d990
Fixed
ae8ac0066b48ed957bdcab58f0d3543549c57a29
Fixed
e9711bd0e64812c694a228cf58c9e6032decee54
Fixed
16236b0b4a08fa3e326cf1373ef789dabdc2e30d
Fixed
725d4fdaa01bd1161782081f419e1568cc7432e0
Fixed
392b3d9d595f34877dd745b470c711e8ebcd225c

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23142.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.18.0
Fixed
6.1.162
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.122
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.67
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.7

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23142.json"