CVE-2026-43154
Description
In the Linux kernel, the following vulnerability has been resolved:
erofs: fix incorrect early exits in volume label handling
Crafted EROFS images containing valid volume labels can trigger incorrect early returns, leading to folio reference leaks.
However, this does not cause system crashes or other severe issues.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's EROFS, crafted images with valid volume labels trigger early returns, leaking folio references.
Vulnerability
CVE-2026-43154 is a vulnerability in the Linux kernel's EROFS file system. The bug occurs in the volume label handling code, where crafted EROFS images containing valid volume labels can cause the kernel to execute incorrect early returns. These early exits lead to a failure in properly releasing folio references, resulting in a folio reference leak. The root cause is a logic error in the control flow when processing volume labels from a maliciously crafted filesystem image.
Exploitation
To exploit this vulnerability, an attacker needs to be able to mount a specially crafted EROFS image on a target system. This could be achieved through local access (e.g., by a user mounting a malicious filesystem) or potentially via a remote vector if a system automatically processes EROFS images from untrusted sources. The attack does not require authentication beyond the ability to mount a filesystem. The vulnerability is triggered during the mount operation when the kernel reads and processes the volume label from the image.
Impact
Successful exploitation results in a folio reference leak, which can lead to gradual memory depletion over time. However, according to the official description, this vulnerability does not cause system crashes or other severe issues. The impact is limited to memory leaks, which could degrade system performance if triggered repeatedly. The CVSS v3 base score is 5.5 (Medium), reflecting the availability impact due to resource exhaustion.
Mitigation
Patches for this vulnerability have been committed to the Linux kernel stable tree. Affected users should update their kernel to versions containing the fix. The specific commits are referenced in the kernel's stable repository [1][2][3]. No workaround is provided, as the fix involves correcting the logic in the volume label handling code.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.