Severity
5.5MEDIUM
EPSS
0.0%
top 99.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 4
Latest updateMar 10

Description

In the Linux kernel, the following vulnerability has been resolved: romfs: check sb_set_blocksize() return value romfs_fill_super() ignores the return value of sb_set_blocksize(), which can fail if the requested block size is incompatible with the block device's configuration. This can be triggered by setting a loop device's block size larger than PAGE_SIZE using ioctl(LOOP_SET_BLOCK_SIZE, 32768), then mounting a romfs filesystem on that device. When sb_set_blocksize(sb, ROMBSIZE) is called

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel2.6.12.15.10.251+7
CVEListV5linux/linux1da177e4c3f41524e886b7f1b8a0c1fc7321cac2a381f0f61b35c8894b0bd0d6acef2d8f9b08b244+7
Debianlinux< 5.10.251-1+3
Debianlinux-6.1< 6.1.164-1~deb11u1

Patches

🔴Vulnerability Details

3
CVEList
romfs: check sb_set_blocksize() return value2026-03-04
GHSA
GHSA-wj4m-w3qm-xpch: In the Linux kernel, the following vulnerability has been resolved: romfs: check sb_set_blocksize() return value romfs_fill_super() ignores the retu2026-03-04
OSV
CVE-2026-23238: In the Linux kernel, the following vulnerability has been resolved: romfs: check sb_set_blocksize() return value romfs_fill_super() ignores the return2026-03-04

📋Vendor Advisories

3
Microsoft
romfs: check sb_set_blocksize() return value2026-03-10
Red Hat
kernel: romfs: check sb_set_blocksize() return value2026-03-04
Debian
CVE-2026-23238: linux - In the Linux kernel, the following vulnerability has been resolved: romfs: chec...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23238 Impact, Exploitability, and Mitigation Steps | Wiz