Impact
f2fs_sanity_check_node_footer may read memory that has not been initialized, exposing arbitrary data from the kernel’s folio buffers. This flaw is a classic CWE‑824 uninitialized value access that can leak sensitive information if the attacker can observe the kernel state after the overflow. The bug does not grant direct code execution but can assist in information gathering or subsequent exploits.
Affected Systems
All Linux kernel versions that contain the f2fs filesystem implementation prior to the defensive commit are affected. The vulnerability is not limited to a specific distribution or kernel release; any system running an unpatched f2fs mount may exercise the vulnerable code path. Version specifics were not enumerated in the advisory, so a broad applicability is assumed.
Risk and Exploitability
The EPSS score is unavailable and no CVSS score is listed, so quantitative risk modeling is impossible. The flaw is confined to kernel mode and is triggered during f2fs mount or read operations. Based on the description, it is inferred that the likely attack vector requires local access or an already-privileged context that can cause a mount or file read on the vulnerable filesystem. Because the vulnerability does not include a remote exploitation route and is not cataloged in CISA KEV, the risk level is moderate; however, the potential for data leakage could be leveraged by an attacker who has compromised the target already.
OpenCVE Enrichment