Impact
This vulnerability originates from a missing reference count decrement in the ext4_xattr_inode_update_ref routine, which can cause reference count leaks for the inode locality buffer (iloc.bh). The leak can accumulate unaddressed resources, potentially leading to memory exhaustion or degraded filesystem performance. The weakness is a classic memory management defect (CWE-401).
Affected Systems
Affected systems are Linux kernels that contain the vulnerable code prior to the fix. The CPE data indicates that the 6.19 release candidates (rc1 through rc5) are impacted, and any kernel variants derived from the generic Linux:Linux product that include those release candidates are also vulnerable. Systems still running these kernels without the applied patch are at risk.
Risk and Exploitability
The CVSS score is 5.5, indicating moderate risk, while the EPSS score is below 1%, implying a very low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. The impact requires execution of ext4 extended attribute operations, which generally requires root or privileged access. Therefore the likely attack vector is local privileged use, and while a remote vector is not indicated, an attacker with sufficient access could trigger the leak repeatedly, leading to resource exhaustion over time.
OpenCVE Enrichment
Ubuntu USN