CVE-2026-43349
Uninit-value Access in F2FS Node Footer
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's f2fs filesystem code. Specifically, it involves an uninitialized value access in the function f2fs_sanity_check_node_footer. The issue occurs when the function f2fs_finish_read_bio() attempts to access data in a folio that may not have been properly initialized if reading data from the device into the folio failed. This can lead to accessing uninitialized memory, which is a bug.
The fix involves adding a check condition in f2fs_finish_read_bio() to avoid accessing uninitialized data in such failure scenarios.
How can this vulnerability impact me? :
Accessing uninitialized memory can lead to unpredictable behavior in the system, including potential crashes or data corruption within the f2fs filesystem. While the exact impact depends on how the system and applications interact with the filesystem, such bugs can undermine system stability and reliability.