Impact
This kernel bug occurs in the buildid module where direct page cache access via read_cache_folio() can dereference a NULL pointer in sleepable contexts. The resulting kernel crash, reported as "BUG: unable to handle kernel NULL pointer dereference," disrupts system availability. The flaw is identified as a NULL pointer dereference (CWE-476).
Affected Systems
The vulnerability affects Linux kernel builds that include the buildid module, notably version 6.12 and the 6.19 series, including pre‑release candidates 6.19‑rc1 through rc8. Any system running these kernels with the buildid functionality active is potentially impacted.
Risk and Exploitability
The CVSS score of 5.5 indicates a moderate risk, while an EPSS score of less than 1 % suggests a very low probability of exploitation under current threat data. The vulnerability is not listed in the CISA KEV catalog. Attackers would need to trigger the faulty read path, typically via local privilege or code that accesses buildid data, to cause a crash.
OpenCVE Enrichment
Debian DSA