Impact
The vulnerability is an improper cursor handling bug in the Linux kernel’s XFS file system. During btree revalidation, the first call to the allocation routine clears a cursor used by the second call, resulting in an unguarded null‑pointer dereference. This leads to a kernel crash when the XFS ioctl or ioctl error‑injection path is exercised. The crash is a non‑privileged denial of service that can be triggered by any user who can run the XFS ioctl or a malformed file system operation, causing an entire system or at least the affected XFS mount to become unresponsive.
Affected Systems
All Linux kernel releases that include the buggy XFS btree repair logic are affected. The known CVE advisory does not list explicit version ranges, but the issue has been observed in recent kernel revisions before the fix was applied. Any system running a kernel that has not been updated to the merge containing the patch (identified by the commit graph references) is likely vulnerable.
Risk and Exploitability
The CVSS score of 7.0 reflects a high impact with local privilege or local user context. The EPSS score is unavailable, and the vulnerability is not currently listed in CISA’s Known Exploited Vulnerabilities catalog, indicating limited evidence of widespread exploitation. However, the repair logic is part of everyday file system maintenance and repair commands, meaning that a local attacker can realistically trigger the fault. The exploitability requires the attacker to deliver a crafted ioctl or create specific corruption conditions, which is feasible for a local user or a malicious kernel module.
OpenCVE Enrichment