CVE-2026-43299
Assertion Failure in Btrfs Filesystem Repair
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19.0-rc6+ |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's btrfs filesystem. When btrfs encounters an ENOSPC (no space left on device) error during a critical operation, it switches the filesystem to read-only mode as expected. However, if a read repair operation is pending at the same time, the system can hit an assertion failure inside the btrfs_repair_io_failure() function because it assumes the filesystem is not read-only. This causes a kernel crash (BUG). The root cause is that the code did not properly handle the case where the filesystem flips to read-only during a read repair, leading to an invalid assertion and system crash.
How can this vulnerability impact me? :
This vulnerability can cause the Linux system to crash unexpectedly when the btrfs filesystem encounters a critical ENOSPC error and attempts a read repair. The crash results from an assertion failure triggered by the filesystem switching to read-only mode during the repair process. This can lead to system instability, potential data loss, or downtime as the kernel encounters a BUG and halts operations.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for specific error messages related to btrfs filesystem operations. Look for kernel messages indicating assertion failures or errors such as ENOSPC (No space left on device) and messages about the filesystem flipping to read-only mode.
- Check kernel logs for assertion failures related to btrfs_repair_io_failure(), for example using: dmesg | grep -i btrfs
- Look for ENOSPC errors and read-only filesystem flips in logs: dmesg | grep -E 'ENOSPC|read-only|btrfs'
- Monitor system journal logs for btrfs errors: journalctl -k | grep btrfs
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is fixed, as the issue is resolved by replacing the ASSERT() with a proper return when the filesystem is already read-only.
Until the kernel is updated, monitor the filesystem for ENOSPC errors and avoid running operations that may trigger the btrfs repair path under low disk space conditions.
Ensure backups are up to date to prevent data loss in case the filesystem flips to read-only or crashes.