Impact
The vulnerability arises when the Linux kernel batches the unmapping of lazyfree folios; mixing writable and non‑writable entries causes the entire batch to be marked writable, which in turn triggers an assertion failure during page table restoration and crashes the kernel. The crash breaks copy‑on‑write semantics and can be reproduced by manipulating memory mappings, representing a high‑impact denial‑of‑service flaw covered by CWE-281 and CWE‑617.
Affected Systems
All Linux kernel builds that have not incorporated the commit correcting PTE restoration logic are vulnerable. The advisory references the general Linux kernel CPE and lists only the 7.0 release candidates (rc1‑rc4) as impacted, implying that any kernel prior to the patch remains at risk.
Risk and Exploitability
The CVSS score of 7.8 indicates significant impact, while the EPSS score of less than 1 % and the fact that it is not listed in CISA’s KEV suggest a low likelihood of widespread exploitation. Based on the description, the likely attack vector is local or privileged code execution that can manipulate memory mappings and trigger the fault.
OpenCVE Enrichment