PT-2026-34363 · Linux · Linux Kernel
Published
2026-04-22
·
Updated
2026-04-22
·
CVE-2026-31458
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
Name of the Vulnerable Software and Affected Versions
Linux kernel (affected versions not specified)
Description
Multiple sysfs command paths dereference
contexts arr[0] without verifying that kdamond->contexts->nr equals 1. A privileged user can set nr contexts to 0 via sysfs while DAMON is running, leading to NULL pointer dereferences. This occurs when executing commands such as 'update schemes stats', 'update schemes tried regions', 'update schemes tried bytes', 'update schemes effective quotas', or 'update tuned intervals' through the state file in the sysfs path '/sys/kernel/mm/damon/admin/kdamonds/0'.Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux Kernel