Impact
In the Linux kernel a logic error in is_bpf_migration_disabled() may incorrectly report that a task is not migration‑disabled when CONFIG_PREEMPT_RCU is not enabled. Because the BPF prolog only calls migrate_disable() under this configuration, the function may allow a truly migration‑disabled task to be scheduled on a remote CPU. That dispatch can trigger an scx_error inside task_can_run_on_remote_rq(), which might result in a kernel panic. The flaw is classified as CWE‑372.
Affected Systems
Any Linux kernel build that includes BPF support and does not contain the patch commit 8e4f0b1ebcf2 is affected. This includes all architectures that ship the unpatched kernel, regardless of the CONFIG_PREEMPT_RCU setting, as long as BPF programs can be loaded.
Risk and Exploitability
The likely attack vector involves the ability to load or run BPF programs, which usually requires elevated privileges such as CAP_SYS_ADMIN or CAP_BPF; however the CVE description does not explicitly enumerate the required privileges. No public exploit is known, EPSS is not available, and the issue is not listed in the CISA KEV catalog. Because the defect could lead to a kernel crash when triggered, the potential impact remains high. The absence of a CVSS score prevents precise quantification of severity.
OpenCVE Enrichment