Impact
An attacker can trigger a kernel crash by invoking the resize ioctl on an OCFS2 file system that contains an invalid dinode. The function ocfs2_group_extend() incorrectly assumes the global bitmap inode block is already validated and therefore crashes when the signature is not a dinode, leading to a kernel panic and potential corruption of the file system. The impact is a loss of availability of the affected node and possibly the loss of data integrity on the corrupted file system.
Affected Systems
All Linux kernel installations that support the OCFS2 file system are affected, regardless of vendor, because the flaw resides in the generic ocfs2_group_extend() routine. Environments that mount OCFS2 volumes and use the resize ioctl are at risk; systems without OCFS2 or that never perform the resize operation are not impacted.
Risk and Exploitability
The EPSS score is reported as < 1%, and the vulnerability is not listed in the CISA KEV catalog, indicating low exploitation probability. However, the crash would have a severe impact if an attacker gains local access or the ability to run the resize ioctl. Exploitation requires the attacker to invoke the ioctl on a vulnerable file system, so the attack vector is local. The CVSS score of 5.5 classifies the vulnerability as moderate severity; given that severity and the low likelihood of exploitation, the overall risk remains moderate.
OpenCVE Enrichment
Debian DSA