CVE-2026-31458
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
22/04/2026
Última modificación:
23/04/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mm/damon/sysfs: check contexts->nr before accessing contexts_arr[0]<br />
<br />
Multiple sysfs command paths dereference contexts_arr[0] without first<br />
verifying that kdamond->contexts->nr == 1. A user can set nr_contexts to<br />
0 via sysfs while DAMON is running, causing NULL pointer dereferences.<br />
<br />
In more detail, the issue can be triggered by privileged users like<br />
below.<br />
<br />
First, start DAMON and make contexts directory empty<br />
(kdamond->contexts->nr == 0).<br />
<br />
# damo start<br />
# cd /sys/kernel/mm/damon/admin/kdamonds/0<br />
# echo 0 > contexts/nr_contexts<br />
<br />
Then, each of below commands will cause the NULL pointer dereference.<br />
<br />
# echo update_schemes_stats > state<br />
# echo update_schemes_tried_regions > state<br />
# echo update_schemes_tried_bytes > state<br />
# echo update_schemes_effective_quotas > state<br />
# echo update_tuned_intervals > state<br />
<br />
Guard all commands (except OFF) at the entry point of<br />
damon_sysfs_handle_cmd().
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/1bfe9fb5ed2667fb075682408b776b5273162615
- https://git.kernel.org/stable/c/1e8da792672481d603fa7cd0d815577220a3ee27
- https://git.kernel.org/stable/c/708033c231bd782858f4ddbb46ee874a5a5fbdab
- https://git.kernel.org/stable/c/aba546061341b56e9ffb37e1eb661a3628b6ec12
- https://git.kernel.org/stable/c/bbe03ad3fb9e714191757ca7b41582f930be7be2



