Impact
The recorded issue occurs when a Btrfs filesystem encounters an ENOSPC condition inside a critical path, prompting the kernel to flip the filesystem to read‑only. If a read repair is ongoing at that moment, the code path `btrfs_repair_io_failure()` unexpectedly executes an ASSERT that expects the filesystem to be writable, resulting in a kernel BUG and a crash. The crash manifests as a kernel oops and brings the entire system down. This is a local denial of service; no remote or privilege escalation is required other than triggering the underlying ENOSPC state.
Affected Systems
All systems running the unpatched Linux kernel that use Btrfs. The specific affected kernel versions are not enumerated in the advisory, but any release before the patch that contains the original `ASSERT()` will be vulnerable. This includes common distribution kernels such as Linux 6.19 and earlier, where the bug was observed during testing. The advisory specifically references kernel 6.19.0-rc6+ in the example trace.
Risk and Exploitability
The CVSS score of 5.5 indicates a medium severity vulnerability, and the EPSS is unavailable; the flaw is not listed in CISA’s KEV catalog. The flaw arises from an internal error (ENOSPC) rather than an externally controllable input, so realistic exploitation requires reproducing the specific failure condition or corrupting the filesystem. Because the outcome is a kernel panic, the impact is high for affected systems but the attack surface is limited. There is no evidence that the flaw can be triggered remotely or used to gain elevated privileges. The overall risk is moderate: a crash leads to downtime, but it does not allow arbitrary code execution.
OpenCVE Enrichment