Impact
The Linux kernel’s Btrfs send code incorrectly accesses the disk_bytenr field of a file extent without verifying that the extent is not inline. When the extent is inline, this read accesses inline data, and if that inline data is less than eight bytes, it can trigger an invalid memory access. An attacker could exploit this flaw to cause a kernel panic or other instability, leading to service disruption. The vulnerability does not appear to provide a remote code execution path, but it can be used to crash the system.
Affected Systems
All Linux kernel builds were potentially impacted prior to the patch, including the 6.19 release candidates (rc1 through rc5). Any distribution kernel that has not been updated to the fixed commit is susceptible.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity. The EPSS score of less than 1% shows a low probability of exploitation, and the vulnerability is not listed in the CISA KEV catalog. Attackers would need local access to the system, as the flaw resides in kernel‑space Btrfs send handling. Overall risk is considered moderate.
OpenCVE Enrichment