Impact
This vulnerability arises in the Linux kernel's erofs filesystem when a short read operation is interrupted by a SIGKILL signal. The kernel incorrectly marks unused folios in the bio structure as uptodate, effectively allowing potentially stale or uninitialized data to be returned to the caller. The bug could be leveraged by an attacker to obtain data beyond the requested read boundaries or to influence program flow based on corrupted file data, resulting in information exposure or subtle integrity violations.
Affected Systems
All Linux kernel builds that contain the erofs filesystem and do not yet incorporate the recent fix are affected. No specific kernel version was provided; the issue is present in any build where the vfs_iocb_iter_read path and erofs_fileio_readahead logic are unpatched.
Risk and Exploitability
The CVSS score and EPSS are currently unavailable, and the bug is not listed in CISA’s KEV catalog. The attack vector is likely local, requiring the ability to mount an erofs filesystem and initiate a read operation that can be interrupted. While the flaw does not provide remote code execution capabilities, its traversal into uninitialized memory may allow privileged local users to read sensitive files or corrupt internal kernel structures. System administrators should treat the risk as moderate, focusing on patch deployment and limiting exposure on untrusted hosts.
OpenCVE Enrichment