Impact
The vulnerability is a NULL pointer dereference in the Linux kernel Damon subsystem. When the number of contexts is set to zero through the sysfs interface while Damon is active, internal functions dereference a null pointer and crash the kernel. This results in a system halt rather than arbitrary code execution.
Affected Systems
The flaw exists in any Linux kernel that includes the Damon daemon monitoring functionality. It affects installations where the sysfs settings for Damon's context count are accessible and can be modified while the daemon is running. No specific affected version information is listed; the vulnerability applies to any kernel build that includes the Damon subsystem.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, and the EPSS score of less than 1% suggests a low probability of exploitation. The flaw is catalogued outside the CISA KEV list, implying no documented public exploits. The vulnerability is triggered by writing the value 0 to the /sys/kernel/mm/damon/.../nr_contexts sysfs attribute while the Damon daemon is active; an attacker with root or equivalent local privileges can perform this manipulation, for example using the damo tool or direct sysfs writes. When nr_contexts is set to zero, internal functions dereference a null pointer, causing the kernel to crash and resulting in a denial‑of‑service condition for the affected system.
OpenCVE Enrichment