Impact
A bug in the f2fs filesystem’s end‑IO handling can cause a mismatch between a node’s page index and the footer’s node ID. When an attacker supplies a filesystem image with a corrupted footer, the kernel accepts the page and later, during writeback, triggers a BUG that can lead to a kernel panic or system reboot. The underlying weakness is a memory corruption vulnerability that can be exploited to destabilize system availability.
Affected Systems
The flaw affects the Linux kernel’s f2fs implementation. All kernel versions prior to the applied patch are susceptible, regardless of distribution, since the affected code is part of the core kernel tree.
Risk and Exploitability
The CVSS score is not provided, but the EPSS score is below 1 %, indicating low probability of widespread exploitation. The vulnerability is not listed in CISA’s KEV catalog, yet an attacker who can supply a malicious or fuzzed filesystem image can trigger it, resulting in a denial‑of‑service attack that forces a system reboot or loss of service. The attack vector is local filesystem access, typically by an attacker who can control the image used by the f2fs volume.
OpenCVE Enrichment