Impact
The vulnerability is a logic flaw in the ext4 filesystem where queued discard work is not flushed or cancelled when a filesystem is remounted with the nodiscard option after previously being mounted with discard. The result is that pending discard jobs may be left unexecuted, meaning data that was deleted may not be fully discarded from the storage device. This flaw does not allow arbitrary code execution, but it can lead to loss or unintended persistence of data and potentially compromise data confidentiality. It corresponds to a resource‑leak weakness (CWE‑584).
Affected Systems
The bug applies to all Linux kernel releases using the ext4 filesystem prior to the inclusion of the patch that forces discard work drain on unmount. All Linux kernel products that ship the ext4 filesystem are affected.
Risk and Exploitability
The CVSS score is not available, and the EPSS score is not reported. The vulnerability is not listed in CISA’s KEV catalog. Exploitation would require local control of the system to mount the filesystem with -o discard, delete files, remount with -o nodiscard, and immediately unmount before any drain completes. Because this sequence is difficult to orchestrate and does not provide external attack vectors, the likelihood of exploitation in the wild is low. The risk is mainly local data persistence or loss rather than remote compromise.
OpenCVE Enrichment