Impact
A bug in the Linux kernel’s ftrace subsystem miscalculates the capacity of allocated page groups, causing the system to underestimate available pages. This misestimation leads to over‑allocating memory for trace records, which in turn triggers warning messages indicating a mismatch between expected and remaining pages. While the bug does not directly corrupt memory, the excessive allocation can consume more RAM than intended, potentially destabilizing the system or exhausting available memory, thereby impacting availability. The weakness corresponds to excessive resource allocation, as defined by CWE‑469.
Affected Systems
The vulnerability applies to all Linux kernel releases prior to the upstream commit that fixed the ftrace calculation logic. Specific affected version ranges are not listed in the advisory; however, any kernel before the patch, regardless of distribution, is potentially impacted. The advisory references the Linux:Linux vendor with no version restrictions.
Risk and Exploitability
The CVSS score of 7.0 indicates a high severity, yet the EPSS score is reported as less than 1%, suggesting that active exploitation is unlikely at this time. The bug is not listed in the CISA KEV catalog, further reducing the immediate threat. Attackers would need privileged access to enable or manipulate ftrace at kernel level to trigger the over‑allocation. Based on the description, it is inferred that the likely attack vector is local and requires superuser privileges. Because the symptoms manifest mainly as kernel warnings rather than an untrusted input exploit, the risk is high but the actual exploitation window is limited.
OpenCVE Enrichment