Impact
The btrfs filesystem module contained a bug where an unexpected delayed reference type entered run_one_delayed_ref() caused a BUG() macro to be executed, immediately triggering a kernel panic. This crash path caused the entire system to halt, representing a classic denial of service attack when the error is surfaced. The flaw is an improper handling of unexpected input that escalated to a fatal kernel fault, a vulnerability that falls under CWE-617: Improper Input Validation.
Affected Systems
All Linux kernel releases that include the btrfs module and do not contain the commit 5549743e11c06da23cfa7712a994b9f1e69064c6 or later are affected. This includes typical distribution kernels that have not been updated to the most recent release in the current maintenance cycle. Users should check the kernel version or the presence of the commit hash to determine exposure.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity. The EPSS score is not available, making it difficult to gauge exploit probability. The vulnerability is not listed in the CISA KEV catalog, indicating no confirmed exploitation in the wild. The likely attack vector is local, requiring the ability to manipulate btrfs metadata or trigger an unexpected delayed reference type. If those conditions are met, an attacker could force a system crash, halting all processes until a reboot.
OpenCVE Enrichment