Impact
An overflow in the nilfs2 filesystem occurs when the FITRIM command calculates the number of blocks to discard. If the supplied end block is too small, the unsigned sector_t calculation underflows, turning a negative number into a very large positive value. This causes the kernel’s block layer to issue an excessively large discard request, holding a semaphore for an extended period and preventing other tasks from progressing. The result is a system hang, as observed by the syzbot test harness. The weakness is a signed to unsigned conversion error (CWE‑193).
Affected Systems
The vulnerability affects all releases of the Linux kernel that include the nilfs2 filesystem implementation, with no specific version range provided. Any system running Linux that mounts a nilfs2 filesystem and permits FITRIM operations is susceptible.
Risk and Exploitability
The CVSS score of 5.5 reflects a moderate impact, and the EPSS score of less than 1% indicates a low likelihood of exploitation. The vulnerability is not listed in CISA’s KEV catalog. It is inferred that attackers would need local or privileged access to issue a FITRIM command on a nilfs2 filesystem; the flaw is thus a local denial-of-service threat that would affect system availability by preventing other processes from acquiring a key mutex lock.
OpenCVE Enrichment
Debian DLA
Debian DSA