Description
In the Linux kernel, the following vulnerability has been resolved:

fs: init flags_valid before calling vfs_fileattr_get

syzbot reported a uninit-value bug in [1].

Similar to the "*get" context where the kernel's internal file_kattr
structure is initialized before calling vfs_fileattr_get(), we should
use the same mechanism when using fa.

[1]
BUG: KMSAN: uninit-value in fuse_fileattr_get+0xeb4/0x1450 fs/fuse/ioctl.c:517
fuse_fileattr_get+0xeb4/0x1450 fs/fuse/ioctl.c:517
vfs_fileattr_get fs/file_attr.c:94 [inline]
__do_sys_file_getattr fs/file_attr.c:416 [inline]

Local variable fa.i created at:
__do_sys_file_getattr fs/file_attr.c:380 [inline]
__se_sys_file_getattr+0x8c/0xbd0 fs/file_attr.c:372
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A fault in the Linux kernel caused a local variable to remain uninitialized before the function vfs_fileattr_get was invoked, as discovered by KMSAN in a FUSE file attribute retrieval call. The defect is an Uninitialized Variable use vulnerability that may result in the kernel reading garbage data, leading to unpredictable behavior or the accidental exposure of kernel memory contents. The CVE description does not explicitly confirm concrete disclosure or denial‑of‑service scenarios, so any impact is inferred from the nature of the fault.

Affected Systems

All Linux kernel releases before the commit that added initialization of the flags_valid flag (identified by commit c379e19e820dd1c6145426b97467728b3b89c0b42) are affected. The vulnerability applies to the Linux kernel itself, regardless of the distribution, as the kernel source is shared across distributions.

Risk and Exploitability

No CVSS score has been published for this issue, but the EPSS score is reported as < 1 %, indicating a very low probability of exploitation. It is not listed in CISA’s KEV catalog. The defect can be triggered only with local system access that allows file attribute operations, so the attack surface is limited to local users who can invoke getattr or related syscalls. Overall, the risk is considered low to moderate, primarily due to the low exploitation probability and local nature of the flaw.

Generated by OpenCVE AI on May 9, 2026 at 16:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a Linux kernel version that includes the patch for commit c379e19e820dd1c6145426b97467728b3b89c0b42 or later
  • If an upgrade is not immediately possible, apply the fix by the same change that initializes flags_valid before calling vfs_fileattr_get into the running kernel source and rebuild the kernel
  • After installing the new kernel, reboot the system and verify that the uninitialized‑value issue no longer surfaces in kernel debugging tools such as KMSAN or through routine system calls

Generated by OpenCVE AI on May 9, 2026 at 16:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 14:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-457

Sat, 09 May 2026 12:15:00 +0000


Fri, 08 May 2026 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-457

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: fs: init flags_valid before calling vfs_fileattr_get syzbot reported a uninit-value bug in [1]. Similar to the "*get" context where the kernel's internal file_kattr structure is initialized before calling vfs_fileattr_get(), we should use the same mechanism when using fa. [1] BUG: KMSAN: uninit-value in fuse_fileattr_get+0xeb4/0x1450 fs/fuse/ioctl.c:517 fuse_fileattr_get+0xeb4/0x1450 fs/fuse/ioctl.c:517 vfs_fileattr_get fs/file_attr.c:94 [inline] __do_sys_file_getattr fs/file_attr.c:416 [inline] Local variable fa.i created at: __do_sys_file_getattr fs/file_attr.c:380 [inline] __se_sys_file_getattr+0x8c/0xbd0 fs/file_attr.c:372
Title fs: init flags_valid before calling vfs_fileattr_get
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-09T04:11:08.098Z

Reserved: 2026-05-01T14:12:56.011Z

Link: CVE-2026-43474

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:17:00.577

Modified: 2026-05-08T15:17:00.577

Link: CVE-2026-43474

cve-icon Redhat

Severity :

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43474 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T16:30:37Z

Weaknesses