Impact
The vulnerability arises when the Linux kernel batches the unmapping of lazyfree folios; a mix of writable and non‑writable entries causes the entire batch to be marked writable. During page table restoration, this leads to an assertion failure that crashes the kernel. The crash breaks copy‑on‑write semantics and can be triggered by a crafted memory sequence, representing a high‑impact denial‑of‑service flaw consistent with CWE-281.
Affected Systems
All Linux kernel builds that have not incorporated the commit fixing the PTE restoration logic are vulnerable. The advisory references the general Linux kernel CPE and provides no specific version range, implying that any kernel prior to the patch is at risk.
Risk and Exploitability
The CVSS score of 7.8 indicates a significant impact, while the EPSS score of less than 1 % and absence from CISA’s KEV suggest a low likelihood of widespread exploitation. Based on the reproduction scenario, the attack vector would require local or privileged code execution to manipulate memory mappings and trigger the fault. Therefore, systems exposed to local attackers or vulnerable high‑privilege processes face a serious risk of kernel panic or denial of service.
OpenCVE Enrichment