Impact
A bug in the Linux kernel DAMON subsystem allows a privileged user to dereference a null pointer when manipulating context objects through sysfs, causing a kernel crash. The flaw arises because the code does not verify that the number of contexts equals one before accessing the first context array element. The resulting crash can interrupt services running on the affected machine, leading to service outages and potential loss of availability. The likely attack vector is local privileged users with write access to the /sys filesystem.
Affected Systems
All Linux kernel versions that include the DAMON (Designation of Areas for Monitoring On-demand) module are potentially affected; the specific patch was applied to the kernel code without enumerating affected releases, so users should verify their kernel version against the latest available release that incorporates the fix.
Risk and Exploitability
The EPSS score is < 1% and the vulnerability is not listed in CISA KEV, and the CVSS score is 5.5. A user with root or equivalent privilege can trigger the flaw by writing 0 to the "nr_contexts" attribute in the DAMON sysfs hierarchy and then issuing any of the state commands that exercise the uninitialized context. Because the kernel ultimately crashes, the exploit leads to a denial of service. The risk remains high for systems that enable and expose DAMON to privileged users.
OpenCVE Enrichment
Debian DSA