Impact
The Linux kernel’s romfs implementation fails to honor the return value from sb_set_blocksize(). When a device with a larger logical block size is used, the function reports failure but romfs continues, leaving the superblock with an oversized block size. Subsequent reads trigger a kernel BUG, crashing the system. This leads to a denial of service. The weakness is an unchecked return value (CWE-617).
Affected Systems
All kernels that contain the unpatched romfs code, including the 2.6.12 release candidates (2.6.12 rc1–rc5) and the 6.19 release candidates (6.19 rc1–rc7) listed by the CPE entries, are affected. The fix is already present in stable kernel releases newer than those versions.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, while the EPSS score of less than 1% suggests a low exploitation likelihood. The attack requires local privilege to configure a loop device with the ioctl(LOOP_SET_BLOCK_SIZE) call, which normally requires root or equivalent capability. Once the device is prepared, mounting a romfs filesystem on it will crash the kernel. The vulnerability does not provide remote code execution or data exfiltration; it simply produces a kernel crash.
OpenCVE Enrichment
Debian DLA
Debian DSA