Impact
The erofs filesystem in the Linux kernel contains a flaw that occurs when a file‑backed mount is read and the read operation is interrupted by a SIGKILL signal. In the error handling path, unused folios in the bio are incorrectly marked as up‑to‑date. As a result, the kernel may treat those pages as containing valid data even though they have not been fully read. This mis‑labeling can cause applications to read stale or uninitialized data, potentially leading to incorrect program behavior.
Affected Systems
All Linux kernel releases that have not incorporated the recent erofs commit sequence are affected. The CVE data does not list specific kernel versions, so any kernel without those commits is at risk.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, while the EPSS score of less than 1% suggests a low probability of exploitation at the time of this analysis. The vulnerability is not listed in the CISA KEV catalog. Exploitation would likely require a local user who can trigger a read on a file‑backed erofs filesystem and cause an interrupt; once the issue triggers, the user may observe incorrect data from the kernel. No evidence of remote code execution or denial of service is present in the available information.
OpenCVE Enrichment