Description
In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Fix memory leak in xe_vm_madvise_ioctl

When check_bo_args_are_sane() validation fails, jump to the new
free_vmas cleanup label to properly free the allocated resources.
This ensures proper cleanup in this error path.

(cherry picked from commit 29bd06faf727a4b76663e4be0f7d770e2d2a7965)
Published: 2026-04-03
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Memory Leak (Potential Denial of Service)
Action: Apply Patch
AI Analysis

Impact

The vulnerability was a memory leak in the Linux kernel's DRM (drm/xe) subsystem, specifically in the xe_vm_madvise_ioctl handler. When the check_bo_args_are_sane() validation fails, resources allocated for virtual memory areas (VMAs) were not properly freed, leading to a leak. This is a classic example of resource exhaustion (CWE-459). While it does not provide direct code execution, the accumulation of unreleased memory could degrade system performance or culminate in a denial of service.

Affected Systems

The issue affects Linux kernel builds where the drm/xe module is compiled. The impacted binaries are part of the standard Linux kernel (vendor Linux, product Linux). Specific kernel versions are not enumerated in the CVE entry, so any kernel containing the vulnerable code before the fix is susceptible. Administrative users or processes with access to the DRM subsystem could trigger the flaw.

Risk and Exploitability

The CVSS score is 5.5, indicating moderate severity, and the EPSS score is below 1%, suggesting a low probability of exploitation in the wild. The flaw is not listed in CISA's Known Exploited Vulnerabilities catalog. Based on the description, it is inferred that exploitation requires local access, such that a user or process can invoke xe_vm_madvise_ioctl and cause a validation failure. An attacker with local or elevated privileges could use this path to degrade system resources, potentially leading to a service disruption.

Generated by OpenCVE AI on April 7, 2026 at 09:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the kernel to a version that includes the fix (commit 29bd06f or later).
  • Verify the kernel contains the patch by checking the commit history or running "git log" for the relevant module.
  • If an immediate kernel upgrade is not possible, monitor system memory usage and restart affected services or reboot to reclaim leaked memory.
  • If the drm/xe module is not required, disable it to eliminate the risk.

Generated by OpenCVE AI on April 7, 2026 at 09:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 08:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-399

Sat, 04 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-459
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-399

Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: drm/xe: Fix memory leak in xe_vm_madvise_ioctl When check_bo_args_are_sane() validation fails, jump to the new free_vmas cleanup label to properly free the allocated resources. This ensures proper cleanup in this error path. (cherry picked from commit 29bd06faf727a4b76663e4be0f7d770e2d2a7965)
Title drm/xe: Fix memory leak in xe_vm_madvise_ioctl
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-13T06:08:15.228Z

Reserved: 2026-03-09T15:48:24.084Z

Link: CVE-2026-31390

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-03T16:16:36.987

Modified: 2026-04-07T13:20:55.200

Link: CVE-2026-31390

cve-icon Redhat

Severity : Low

Publid Date: 2026-04-03T00:00:00Z

Links: CVE-2026-31390 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:53:34Z

Weaknesses