CVE-2026-43409
Kernel crash in Linux kernel after ftrace kill
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's kprobes subsystem related to ftrace. When ftrace is killed due to some errors, the kernel crashes if modules that have kprobe probes are removed. The root cause is that the kprobe on ftrace does not correctly handle the kprobe_ftrace_disabled flag set by ftrace_kill(). This leads to a page fault and kernel crash during module removal operations.
The fix involves checking the kprobe_ftrace_disabled flag in the __disarm_kprobe_ftrace() function and skipping all ftrace related operations if the flag is set, preventing the crash.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash when removing kernel modules that have kprobe probes after ftrace has been killed by errors. Such crashes can lead to system instability, unexpected downtime, and potential loss of data or service availability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for kernel crashes or oops messages related to kprobes and ftrace when removing kernel modules.
Specifically, look for kernel logs containing messages like "BUG: unable to handle page fault for address" and "Oops: 0000 [#1] SMP KASAN PTI" with references to kprobes_module_callback and rmmod commands.
You can check kernel logs using commands such as:
- dmesg | grep -i 'kprobes_module_callback'
- journalctl -k | grep -i 'Oops'
- journalctl -k | grep -i 'rmmod'
- grep -i 'BUG' /var/log/kern.log
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, avoid removing kernel modules (rmmod) or inserting modules (insmod) after ftrace has been killed or encountered errors.
Ensure that the kernel is updated with the patch that checks the kprobe_ftrace_disabled flag in __disarm_kprobe_ftrace() and skips all ftrace related operations to prevent crashes.
If updating the kernel immediately is not possible, monitor kernel logs closely for related crashes and avoid operations that trigger this issue.