Impact
The vulnerability arises in the Linux kernel when the DAMON online monitoring context is updated. During a damon_call() callback, damon_commit_ctx() may fail due to memory allocation errors, leaving the damon_ctx partially updated. If the code continues to use this corrupted context, a NULL pointer dereference can occur, potentially crashing the kernel. This defect does not provide direct data leakage or malicious code execution, but can lead to a denial of service by forcing a system reboot or instability when the kernel attempts to use a corrupted DAMON context. The likely attack vector is a local process that invokes damon_call() in a way that triggers the allocation failure; external attackers would need elevated privileges to interact with the kernel DAMON subsystem to realize the impact.
Affected Systems
Linux kernel implementations are affected. The issue targets the kernel’s DAMON subsystem in any kernel that has not yet incorporated the patch that introduces damon_ctx->maybe_corrupted and the associated safety checks. Specific version information is not supplied in the CVE data; the vulnerability has been addressed in a series of kernel commits (see the provided references).
Risk and Exploitability
The CVSS score is 5.5 and the EPSS score is <1%, and the vulnerability is not listed in the CISA KEV catalog. The vulnerability could theoretically be exploited in a local context where an attacker can trigger damon_call() failures, but the rarity of memory allocation failures makes real‑world exploitation unlikely. The primary risk is system instability rather than privilege escalation, and the exploitability depends on an attacker’s ability to manipulate the DAMON subsystem and to induce a memory allocation failure at a precise moment. Overall, the risk is modest but significant for systems relying on DAMON for performance monitoring. The issue is a Null Pointer Dereference (CWE-476).
OpenCVE Enrichment