Impact
A flaw in the Linux kernel’s XFS file system recovery path causes a release operation to be performed on an uninitialized or dangling pointer when attribute recovery fails to obtain an inode reference. The resulting memory corruption can trigger a kernel crash or panic, potentially disrupting system availability and exposing the machine to further instability. The vulnerability is a classic use‑of‑invalid‑pointer scenario, identified as a memory management issue.
Affected Systems
All Linux kernel releases that include the XFS file system are potentially impacted, as the flaw resides in core XFS module code. No specific version range is listed, so any installation using an unpatched kernel remains at risk until the patch is applied.
Risk and Exploitability
The severity of the flaw is significant because it can lead to a kernel panic, but no CVSS score or EPSS value is publicly available, and it is not catalogued in CISA KEV. The attack vector is unclear from the available data; it could arise during normal filesystem operation, or when a corrupted XFS attribute triggers the recovery path. Exploitation would require the attacker to induce or trigger the fault condition, which may be possible through malicious file system manipulation or during a disk corruption event. Due to the potential for system downtime, administrators should consider this unsafe even in the absence of a public exploit.
OpenCVE Enrichment