Impact
A kernel assertion bug exists in the 9P filesystem path when the kernel writes a core dump to a 9P filesystem. The core dump routine creates an ITER_KVEC iterator that is not handled by netfs_limit_iter(), causing the kernel to invoke BUG() and panic. The result is a denial of service from a system crash. The flaw involves incorrect handling of iterator types, which corresponds to CWE-476 and CWE-843.
Affected Systems
All Linux kernel builds that include 9P filesystem support and have not yet applied the netfs_limit_kvec patch are affected. This includes all releases prior to the commit that added the patch. No specific version ranges are listed, so any Linux kernel built without the fix is vulnerable.
Risk and Exploitability
The EPSS score of < 1% indicates a very low but nonzero exploitation probability, and the CVSS score of 5.5 reflects moderate severity. The vulnerability is not listed in the CISA KEV catalog. It can be triggered locally when a process crashes on a 9P mount, causing the kernel to panic. Based on the description, it is inferred that a remote attacker would need to invoke privileged code or force a process crash to trigger the bug. No public exploits are known, but the kernel instability could cause a moderate-to-high impact if exploited.
OpenCVE Enrichment
Debian DSA