Description
In the Linux kernel, the following vulnerability has been resolved:

LoongArch: KVM: Fix kvm_device leak in kvm_eiointc_destroy()

In kvm_ioctl_create_device(), kvm_device has allocated memory,
kvm_device->destroy() seems to be supposed to free its kvm_device
struct, but kvm_eiointc_destroy() is not currently doing this, that
would lead to a memory leak.

So, fix it.
Published: 2026-01-31
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Memory Leak in KVM device creation leading to resource exhaustion
Action: Apply Patch
AI Analysis

Impact

The Linux kernel for LoongArch contains a flaw in the KVM subsystem where the kvm_eiointc_destroy routine fails to free the allocated kvm_device structure. When a KVM device is created and subsequently destroyed, the unused memory remains allocated, causing a kernel memory leak. This gradual memory consumption can degrade overall system performance and, if left unchecked, may contribute to a denial‑of‑service condition by exhausting available kernel memory.

Affected Systems

All Linux kernel builds that support the LoongArch architecture and include the KVM eiointc device code prior to the patch commit 7d8553fc75aefa7ec936af0cf8443ff90b51732e. The affected product is the Linux kernel (LoongArch variant). Any distribution using a kernel version that has not incorporated this fix is at risk.

Risk and Exploitability

With an EPSS score of less than 1%, the probability of active exploitation is very low and the flaw is not listed in the CISA KEV catalog, indicating no known exploits. The vulnerability does not provide direct remote code execution; the likely attack vector requires an attacker with the privilege to invoke kvm_ioctl_create_device and trigger repeated device creations and deletions, which would exhaust memory over time. Overall, the risk is low but can lead to resource exhaustion if unmitigated.

Generated by OpenCVE AI on April 18, 2026 at 00:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that includes the fix (any release that contains commit 7d8553fc75aefa7ec936af0cf8443ff90b51732e).
  • If a kernel upgrade is not immediately possible, apply the patch from the kernel repository by cherry‑pulling commit 7d8553fc75aefa7ec936af0cf8443ff90b51732e (or its equivalent) into the current kernel tree and recompiling.
  • Consider restricting KVM device creation privileges on the host (e.g., limit the use of kvm_ioctl_create_device to trusted users or remove the eiointc device entirely) until the kernel can be updated.

Generated by OpenCVE AI on April 18, 2026 at 00:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Tue, 03 Feb 2026 00:15:00 +0000


Sat, 31 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: LoongArch: KVM: Fix kvm_device leak in kvm_eiointc_destroy() In kvm_ioctl_create_device(), kvm_device has allocated memory, kvm_device->destroy() seems to be supposed to free its kvm_device struct, but kvm_eiointc_destroy() is not currently doing this, that would lead to a memory leak. So, fix it.
Title LoongArch: KVM: Fix kvm_device leak in kvm_eiointc_destroy()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-02-09T08:37:23.573Z

Reserved: 2026-01-13T15:37:45.942Z

Link: CVE-2026-23029

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-01-31T12:16:06.217

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-23029

cve-icon Redhat

Severity :

Publid Date: 2026-01-31T00:00:00Z

Links: CVE-2026-23029 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T01:00:11Z

Weaknesses