CVE-2026-23238
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
04/03/2026
Last modified:
17/03/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
romfs: check sb_set_blocksize() return value<br />
<br />
romfs_fill_super() ignores the return value of sb_set_blocksize(), which<br />
can fail if the requested block size is incompatible with the block<br />
device&#39;s configuration.<br />
<br />
This can be triggered by setting a loop device&#39;s block size larger than<br />
PAGE_SIZE using ioctl(LOOP_SET_BLOCK_SIZE, 32768), then mounting a romfs<br />
filesystem on that device.<br />
<br />
When sb_set_blocksize(sb, ROMBSIZE) is called with ROMBSIZE=4096 but the<br />
device has logical_block_size=32768, bdev_validate_blocksize() fails<br />
because the requested size is smaller than the device&#39;s logical block<br />
size. sb_set_blocksize() returns 0 (failure), but romfs ignores this and<br />
continues mounting.<br />
<br />
The superblock&#39;s block size remains at the device&#39;s logical block size<br />
(32768). Later, when sb_bread() attempts I/O with this oversized block<br />
size, it triggers a kernel BUG in folio_set_bh():<br />
<br />
kernel BUG at fs/buffer.c:1582!<br />
BUG_ON(size > PAGE_SIZE);<br />
<br />
Fix by checking the return value of sb_set_blocksize() and failing the<br />
mount with -EINVAL if it returns 0.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.12.1 (including) | 5.10.251 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.201 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.164 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.127 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.74 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.13 (excluding) |
| cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2c5829cd8fbbc91568c520b666898f57cdcb8cf6
- https://git.kernel.org/stable/c/4b71ad7676564a94ec5f7d18298f51e8ae53db73
- https://git.kernel.org/stable/c/9b203b8ddd7359270e8a694d0584743555128e2c
- https://git.kernel.org/stable/c/a381f0f61b35c8894b0bd0d6acef2d8f9b08b244
- https://git.kernel.org/stable/c/ab7ad7abb3660c58ffffdf07ff3bb976e7e0afa0
- https://git.kernel.org/stable/c/cbd9931e6456822067725354d83446c5bb813030
- https://git.kernel.org/stable/c/f2521ab1f63a8c244f06a080319e5ff9a2e1bd95



