CVE-2026-23018
BaseFortify
Publication date: 2026-01-31
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | From 6.16.9 (inc) to 6.17 (exc) |
| linux | linux_kernel | From 6.17.1 (inc) to 6.18.6 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's btrfs filesystem involves a circular locking dependency caused by releasing a path before initializing the extent tree in the function btrfs_read_locked_inode(). Specifically, while holding a read-locked path from a subvolume tree, the function btrfs_init_file_extent_tree() is called, which may perform a GFP_KERNEL memory allocation that can trigger memory reclaim. This sequence can create a circular lock dependency, leading to warnings from the kernel's lock dependency checker (lockdep) and potentially causing deadlocks or system instability.
How can this vulnerability impact me? :
This vulnerability can lead to circular locking dependencies within the kernel, which may cause deadlocks or system instability. Such deadlocks can halt processes or degrade system performance, potentially affecting the reliability and availability of systems using the btrfs filesystem on the Linux kernel.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the kernel logs for warnings about possible circular locking dependencies related to btrfs. Specifically, look for messages similar to the lockdep warning shown in the description, which includes references to btrfs_read_locked_inode(), btrfs_init_file_extent_tree(), and mutex lock dependencies. You can check kernel logs using commands like 'dmesg | grep lockdep' or 'journalctl -k | grep lockdep' to find such warnings.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is resolved. Since the issue is in the btrfs subsystem of the kernel, applying the vendor-provided kernel patches or upgrading to a fixed kernel version will mitigate the circular lock dependency problem. Until then, monitoring for the lockdep warnings and avoiding heavy btrfs operations that might trigger the issue can help reduce risk.