Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-31440
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-22 Apr, 2026 | 13:53
Updated At-17 May, 2026 | 15:21
Rejected At-
▼CVE Numbering Authority (CNA)
dmaengine: idxd: Fix leaking event log memory

In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Fix leaking event log memory During the device remove process, the device is reset, causing the configuration registers to go back to their default state, which is zero. As the driver is checking if the event log support was enabled before deallocating, it will fail if a reset happened before. Do not check if the support was enabled, the check for 'idxd->evl' being valid (only allocated if the HW capability is available) is enough.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/dma/idxd/device.c
Default Status
unaffected
Versions
Affected
  • From 244da66cda359227d80ccb41dbcb99da40eae186 before 695b491dc3f20365fd5821f22e25dbe3c1c20cbc (git)
  • From 244da66cda359227d80ccb41dbcb99da40eae186 before d94f9b0ba28a205caf95902ee88b42bdb8af83d0 (git)
  • From 244da66cda359227d80ccb41dbcb99da40eae186 before facd0012708e942fc12890708738aebde497564e (git)
  • From 244da66cda359227d80ccb41dbcb99da40eae186 before 9dfa00967e6ef43a9dd0887fe5c3a721a39da92e (git)
  • From 244da66cda359227d80ccb41dbcb99da40eae186 before ee66bc29578391c9b48523dc9119af67bd5c7c0f (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/dma/idxd/device.c
Default Status
affected
Versions
Affected
  • 6.4
Unaffected
  • From 0 before 6.4 (semver)
  • From 6.6.140 through 6.6.* (semver)
  • From 6.12.80 through 6.12.* (semver)
  • From 6.18.21 through 6.18.* (semver)
  • From 6.19.11 through 6.19.* (semver)
  • From 7.0 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/695b491dc3f20365fd5821f22e25dbe3c1c20cbc
N/A
https://git.kernel.org/stable/c/d94f9b0ba28a205caf95902ee88b42bdb8af83d0
N/A
https://git.kernel.org/stable/c/facd0012708e942fc12890708738aebde497564e
N/A
https://git.kernel.org/stable/c/9dfa00967e6ef43a9dd0887fe5c3a721a39da92e
N/A
https://git.kernel.org/stable/c/ee66bc29578391c9b48523dc9119af67bd5c7c0f
N/A
Hyperlink: https://git.kernel.org/stable/c/695b491dc3f20365fd5821f22e25dbe3c1c20cbc
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d94f9b0ba28a205caf95902ee88b42bdb8af83d0
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/facd0012708e942fc12890708738aebde497564e
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/9dfa00967e6ef43a9dd0887fe5c3a721a39da92e
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/ee66bc29578391c9b48523dc9119af67bd5c7c0f
Resource: N/A
Details not found