๐Ÿ” CVE Alert

CVE-2026-23238

UNKNOWN 0.0

romfs: check sb_set_blocksize() return value

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: romfs: check sb_set_blocksize() return value romfs_fill_super() ignores the return value of sb_set_blocksize(), which can fail if the requested block size is incompatible with the block device's configuration. This can be triggered by setting a loop device's block size larger than PAGE_SIZE using ioctl(LOOP_SET_BLOCK_SIZE, 32768), then mounting a romfs filesystem on that device. When sb_set_blocksize(sb, ROMBSIZE) is called with ROMBSIZE=4096 but the device has logical_block_size=32768, bdev_validate_blocksize() fails because the requested size is smaller than the device's logical block size. sb_set_blocksize() returns 0 (failure), but romfs ignores this and continues mounting. The superblock's block size remains at the device's logical block size (32768). Later, when sb_bread() attempts I/O with this oversized block size, it triggers a kernel BUG in folio_set_bh(): kernel BUG at fs/buffer.c:1582! BUG_ON(size > PAGE_SIZE); Fix by checking the return value of sb_set_blocksize() and failing the mount with -EINVAL if it returns 0.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Mar 4, 2026
Last Updated Mar 8, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < a381f0f61b35c8894b0bd0d6acef2d8f9b08b244 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < f2521ab1f63a8c244f06a080319e5ff9a2e1bd95 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 2c5829cd8fbbc91568c520b666898f57cdcb8cf6 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < cbd9931e6456822067725354d83446c5bb813030 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 9b203b8ddd7359270e8a694d0584743555128e2c 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 4b71ad7676564a94ec5f7d18298f51e8ae53db73 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < ab7ad7abb3660c58ffffdf07ff3bb976e7e0afa0
Linux / Linux
2.6.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/a381f0f61b35c8894b0bd0d6acef2d8f9b08b244 git.kernel.org: https://git.kernel.org/stable/c/f2521ab1f63a8c244f06a080319e5ff9a2e1bd95 git.kernel.org: https://git.kernel.org/stable/c/2c5829cd8fbbc91568c520b666898f57cdcb8cf6 git.kernel.org: https://git.kernel.org/stable/c/cbd9931e6456822067725354d83446c5bb813030 git.kernel.org: https://git.kernel.org/stable/c/9b203b8ddd7359270e8a694d0584743555128e2c git.kernel.org: https://git.kernel.org/stable/c/4b71ad7676564a94ec5f7d18298f51e8ae53db73 git.kernel.org: https://git.kernel.org/stable/c/ab7ad7abb3660c58ffffdf07ff3bb976e7e0afa0