CVE-2026-23181
Null Pointer Dereference in Linux btrfs Due to Block Size Mismatch
Publication date: 2026-02-14
Last updated on: 2026-02-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's btrfs filesystem when mounting a block device. The issue arises because the block size of the device is not set correctly when the user executes the BLKBSZSET command, which changes the block size from 0x1000 to 0x4000. This change affects internal calculations related to memory allocation orders.
Specifically, before the BLKBSZSET command, a memory folio is allocated with an order value of 0. After the block size changes, the expected order value becomes 2, causing an assertion failure and a null pointer dereference in the kernel due to buffer head allocation failure. This inconsistency happens because synchronization between the block size change and cache page reading is not properly established.
How can this vulnerability impact me? :
This vulnerability can lead to kernel crashes due to assertion failures and null pointer dereferences when mounting btrfs filesystems. Such crashes can cause system instability, data loss, or denial of service by making the filesystem or the entire system unusable until rebooted or patched.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know