Description
In the Linux kernel, the following vulnerability has been resolved:

regmap: maple: free entry on mas_store_gfp() failure

regcache_maple_write() allocates a new block ('entry') to merge
adjacent ranges and then stores it with mas_store_gfp().
When mas_store_gfp() fails, the new 'entry' remains allocated and
is never freed, leaking memory.

Free 'entry' on the failure path; on success continue freeing the
replaced neighbor blocks ('lower', 'upper').
Published: 2026-03-18
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Memory Leak
Action: Apply Patch
AI Analysis

Impact

The vulnerability resides in the Linux kernel’s regmap maple subsystem. When regcache_maple_write allocates a new mapping entry to merge adjacent ranges and writes it through mas_store_gfp, a failure of mas_store_gfp leaves the newly allocated entry in memory. The entry is never freed, creating a memory leak. According to the CVE description, the failure path does not release the entry, while the success path correctly frees neighboring blocks. This defect is a classic example of a resource exhaustion issue (CWE-401). It could lead to gradual growth of memory usage in systems that frequently perform regcache maple writes, potentially impacting stability or availability if the leaked memory drains the system’s memory pool.

Affected Systems

The flaw affects kernel code distributed by the Linux kernel project. The known CNA vendors list includes "Linux:Linux" twice, indicating that any system running a kernel version that incorporates the affected regmap maple code could be impacted. Specific product or version information is not provided in the known CNA affected version field, so users must ascertain whether their kernel source or distribution contains the unpatched code.

Risk and Exploitability

The CVSS score is 5.5, indicating moderate severity. An EPSS score of 0.00023 (much less than 1%) suggests a very low but non‑zero likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog, indicating no known active exploitation. The risk primarily stems from cumulative memory leakage rather than an immediate remote code execution vector. Attackers would likely need to continuously trigger regcache maple writes to exhaust memory, which is more of a denial‑of‑service scenario than an exploit for privilege escalation or confidentiality breaches.

Generated by OpenCVE AI on April 15, 2026 at 09:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a patched release that includes the memory deallocation fix.
  • Reboot or reload the kernel to activate the updated code.
  • Use memory monitoring tools (e.g., vmstat, free, /proc/meminfo) to detect ongoing leaks and trigger remediation if thresholds exceed.
  • If immediate kernel upgrade is unavailable, disable the regmap maple functionality or restrict usage of regcache maple writes until the patch is applied.

Generated by OpenCVE AI on April 15, 2026 at 09:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 19 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Wed, 18 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: regmap: maple: free entry on mas_store_gfp() failure regcache_maple_write() allocates a new block ('entry') to merge adjacent ranges and then stores it with mas_store_gfp(). When mas_store_gfp() fails, the new 'entry' remains allocated and is never freed, leaking memory. Free 'entry' on the failure path; on success continue freeing the replaced neighbor blocks ('lower', 'upper').
Title regmap: maple: free entry on mas_store_gfp() failure
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-03-19T16:01:05.479Z

Reserved: 2026-01-13T15:37:45.990Z

Link: CVE-2026-23260

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-18T18:16:24.477

Modified: 2026-03-19T13:25:00.570

Link: CVE-2026-23260

cve-icon Redhat

Severity : Low

Publid Date: 2026-03-18T00:00:00Z

Links: CVE-2026-23260 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:45:09Z

Weaknesses

No weakness.