Impact
In the ARM MPAM subsystem of the Linux kernel, a null pointer dereference occurs when a Media Storage Controller that monitors memory bandwidth is taken offline and then brought back online. The restore routine fails to initialize a local variable for the counter value, causing __ris_msmon_read to dereference a NULL pointer and trigger a kernel oops. The resulting crash forces a reboot and can disrupt system availability.
Affected Systems
All Linux kernel builds that include the ARM MPAM subsystem and support MSC bandwidth monitoring are vulnerable unless the fix commit has been applied. The CPE data lists a broad range of kernel versions (from 6.19 and all 7.0-rc releases), implying that any kernel containing MPAM without the patch is affected.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, and the EPSS score of < 1% suggests a very low probability of exploitation. The vulnerability is not listed in CISA's KEV catalog. Because the trigger requires control of the MSC offline/online cycle, the attack vector is limited to local privileged or hardware-level access. The impact is a denial of service via kernel crash, with no evidence of further privileges or data exposure.
OpenCVE Enrichment