Impact
The vulnerability occurs in the Linux JFS file system when a child directory is renamed inside a parent directory that already has the maximum link count (represented by -1). During the rename, the kernel increments the link count before decrementing it, which causes an integer overflow from -1 to 0. This overflow triggers a kernel warning from drop_nlink, indicating a potential inconsistency in the file system metadata. The patch resolves the overflow, preventing the warning and restoring proper link count handling.
Affected Systems
The flaw affects any Linux kernel build that includes JFS support, as identified by the CPE cpe:2.3:o:linux:linux_kernel. No specific kernel versions are listed, so all kernels running JFS before the patch are potentially vulnerable. Users should verify whether their system employs JFS and whether the running kernel version predates the fix.
Risk and Exploitability
Since the issue is limited to the JFS file system and requires local access to perform a rename operation on a directory with the maximum link count, its exploitability is low and no external attack vector is documented. No EPSS score or KEV listing is available, further indicating a low risk. The primary consequence is a kernel warning and potential file system instability rather than immediate denial of service or data loss. Applying the patch eliminates the overflow and the associated warning.
OpenCVE Enrichment