Impact
A flaw in the Linux kernel’s kprobe handling causes a crash when a module is removed or loaded after the ftrace subsystem has been disabled. The core issue is that the kprobe module does not honor the ftrace‑disabled flag, leading to an invalid memory access during a module unload. The resulting kernel panic nullifies system availability and can be triggered by a local user with permission to load or unload kernel modules.
Affected Systems
All Linux kernel versions that have not incorporated the recent fix. No specific version range is enumerated, so any kernel using the standard kprobe/kprobes module is potentially vulnerable until patched.
Risk and Exploitability
The EPSS score is unavailable, and the vulnerability is not listed in the CISA KEV catalog. This vulnerability carries a CVSS score of 5.5, indicating moderate severity. While the problem does not expose a direct code‑execution vector, it enables a local attacker to disrupt service by causing a kernel crash. The risk is therefore high for systems where modules can be manipulated without additional isolation controls, but the likelihood of exploitation remains limited to privileged contexts.
OpenCVE Enrichment