Impact
The f2fs filesystem exposes several sysfs attributes that control internal counters and thresholds. When an attribute is written with a numeric value larger than the underlying data type, the kernel performs a size‑agnostic update. This results in memory corruption: out‑of‑bounds writes for attributes smaller than four bytes and truncation or incorrect reads for larger values. Such corruption can corrupt kernel data structures, which may allow a local user to elevate privileges or cause system instability. The critical weakness is classified as CWE‑125, "Out‑of‑Bounds Read or Write."
Affected Systems
All Linux kernel installations that include the f2fs filesystem are potentially affected. The patch addresses the issue in the generic Linux kernel; no specific kernel revision is listed, so the vulnerability applies to any kernel version that has not yet incorporated the fix. Users should determine whether their system runs an affected kernel and apply the update if applicable.
Risk and Exploitability
The CVSS score of 7.1 indicates a moderate‑to‑high severity, mainly due to the memory corruption and privilege escalation risk. The EPSS score is less than 1 %, implying that, as of the last assessment, exploitation attempts are rare, and the vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is local: a user with write permission to /sys/fs/f2fs can supply overflowing values. An attacker may need only ordinary user privileges on the machine, but achieving higher privileges or a crash requires successful exploitation of the corrupted data. Given the moderate worth and low exploitation probability, systems should still address the issue promptly, as a local attack can be sufficient to undermine system integrity.
OpenCVE Enrichment
Debian DLA
Debian DSA