Impact
The bug occurs when qgroup ioctl calls in the BTRFS filesystem do not reserve sufficient transaction items; as a result, the kernel may fail to reserve space for delayed references and quota tree updates, causing a transaction abort with an -ENOSPC error. This can lead to a failure of file system operations and, in worst cases, corruption of BTRFS metadata if the abort is not handled correctly. The vulnerability does not provide a direct remote code execution path, but it can be abused to disrupt file system availability and stability.
Affected Systems
All Linux kernels that include BTRFS support are affected, regardless of distribution, until the fix is applied. The issue was observed in kernel 6.19.0-rc8 and earlier. No specific vendor or product versions are enumerated in the data, so any kernel version prior to the patch that contains BTRFS is potentially impacted.
Risk and Exploitability
The primary risk is a denial of service that can be triggered by privileged or local users performing heavy quota and qgroup operations on a BTRFS volume. The vulnerability lacks measurable web‑based exploitation potential; EPSS data is not available, and the issue is not listed in CISA’s KEV catalog. Because the flaw is tied to internal kernel bookkeeping, an attacker would need local or elevated privileges to exercise the affected ioctl path. The correct mitigations are to upgrade the kernel, or as a stop‑gap, avoid the qgroup feature or keep the filesystem sufficiently empty to avoid triggering the abort.
OpenCVE Enrichment