where all the memory safety features have to be disabled
This is totally false. Unsafe rust, contrary to common belief by those who haven't used the language, doesn't turn off "all the memory safety" as you just claimed. As noted in one of the links in TFS, the type system continues to be enforced, which also means that pointer lifetimes are enforced by the borrow checker as well. That alone maintains both type safety and temporal safety. Of course, you can defeat temporal safety guarantees with some indirection, but not only is that going to be dead obvious, it's also going to make you look incredibly stupid to every kernel developer. That is to say, for once Linus won't be the only person scolding you about how stupid you are, how shitty your code is, etc. You can defeat type safety with std::mem::transmute, but the same caveat applies.
Data race safety also remains intact unless you explicitly implement the Sync or Send marker traits on your data types, and doing so is going to invite even more scrutiny over your code (it's also something you just plain don't need to do unless you're trying to do some sort of arcane parallel access optimization.) Plenty other forms of safety remain intact as well, such as bounds checks (you can't implicitly skip these) variable initialization, no frees or double-frees, no dirty cows, null pointer safety, and a lot more I'm not thinking of right now.
Which is without a doubt contributing to the fact that exploiting this CVE will only yield a crash rather than anything serious like arbitrary code execution, data disclosure, or fault injection.
at all the same failure points where C and assembly have been used... for reasons.
Name some specific examples.