Description
In the Linux kernel, the following vulnerability has been resolved:

erofs: fix incorrect early exits in volume label handling

Crafted EROFS images containing valid volume labels can trigger
incorrect early returns, leading to folio reference leaks.

However, this does not cause system crashes or other severe issues.
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw in the Linux kernel’s EROFS implementation allows an attacker to supply a specially crafted image containing a valid volume label. When the kernel processes the label, an early return is triggered in a way that the kernel fails to release internal folio references. This results in leaks of kernel memory references that could expose sensitive information, though it does not destabilize the system or cause crashes.

Affected Systems

The vulnerability exists in the Linux kernel itself. No specific kernel release dates or versions are listed in the data; all Linux kernel releases that incorporate the EROFS filesystem are potentially affected until an official fixed kernel is deployed.

Risk and Exploitability

The CVSS score is unspecified, and EPSS is not available, but the attack requires an attacker to mount a malicious EROFS image or otherwise trigger volume label handling. The likely attack vector is local or user‑initiated, and the exploit does not need elevated privileges beyond the ability to mount the image. Because the impact is limited to leaking references and not system crash or privilege escalation, the overall risk is moderate. The vulnerability is not listed in CISA’s KEV catalog and there are no known widespread exploits.

Generated by OpenCVE AI on May 6, 2026 at 13:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a version that contains the upstream patch for the EROFS volume label handling bug.
  • If an updated kernel is not immediately available, avoid mounting untrusted EROFS images and consider disabling the EROFS filesystem module until a fix is applied.
  • Review kernel configuration and limit the set of users or processes allowed to mount or load EROFS images to reduce exposure.

Generated by OpenCVE AI on May 6, 2026 at 13:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 14:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-203

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: erofs: fix incorrect early exits in volume label handling Crafted EROFS images containing valid volume labels can trigger incorrect early returns, leading to folio reference leaks. However, this does not cause system crashes or other severe issues.
Title erofs: fix incorrect early exits in volume label handling
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:27:35.116Z

Reserved: 2026-05-01T14:12:55.989Z

Link: CVE-2026-43154

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:33.193

Modified: 2026-05-06T13:07:51.607

Link: CVE-2026-43154

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T18:00:11Z

Weaknesses