Impact
The flaw allows a local user to change a block device’s size via the BLKBSZSET ioctl while a Btrfs file system is mounted. This adjustment alters the mapping flags used by the kernel’s block request logic, causing the calculated minimum folio order to increase. The result is that folios allocated before size change are considered too small, triggering kernel assertions and a null–pointer dereference in create_empty_buffers(). The error manifests as a kernel oops, effectively crashing the system and denying service.
Affected Systems
All Linux kernel releases that contain the flawed Btrfs code path and do not yet include the patch for CVE-2026-23181. The exact affected kernel versions are not listed, so any unpatched kernel that supports Btrfs is at risk.
Risk and Exploitability
The vulnerability is scored with a CVSS of 7.0 (High) and an EPSS of <1%, indicating a low likelihood of widespread exploitation at this time. It is a local privilege issue: the attacker must have the ability to issue BLKBSZSET on a block device used by a mounted Btrfs volume, which typically requires root privileges or device‑mngmt access. The attack does not require network exposure, but can be performed by any privileged user. The victim’s confidentiality and integrity remain unchanged; the primary consequence is a system crash and interruption of services.
OpenCVE Enrichment