CVE-2023-54264
Description
In the Linux kernel, the following vulnerability has been resolved:
fs/sysv: Null check to prevent null-ptr-deref bug
sb_getblk(inode->i_sb, parent) return a null ptr and taking lock on that leads to the null-ptr-deref bug.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A null pointer dereference in the Linux kernel's sysv filesystem driver could allow a local attacker to cause a denial of service.
Vulnerability
The Linux kernel's sysv filesystem driver (fs/sysv) contains a null pointer dereference vulnerability. The function sb_getblk can return a NULL pointer when block allocation fails, but the return value was used without a prior NULL check before taking a lock. This leads to a kernel crash when the NULL pointer is dereferenced [1][2][3].
Exploitation
An attacker must have local access and be able to mount a specially crafted SYSV filesystem image. Triggering the vulnerability requires causing sb_getblk to fail, e.g., by inducing memory pressure or providing a corrupted filesystem that forces a failed block allocation. Depending on the system configuration, mounting typically requires root privileges or CAP_SYS_ADMIN.
Impact
Successful exploitation results in a denial of service (system crash or kernel panic). No privilege escalation or remote exploitation has been described.
Mitigation
The issue is fixed in the Linux kernel mainline and stable trees via commits that add a NULL check before dereferencing sb_getblk's return value. Users should apply the latest kernel updates from their distribution or the stable kernel series [1][2][3].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
8e976988bc245baa60c66a3100a44ceba77c37f740bc696d4afd9a31b5aa41416eebaad80e28f376dd8dfea2b62f30589Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/0a44ceba77c3267f8505dda102a59367dc24caeenvd
- git.kernel.org/stable/c/1416eebaad80bdc85ad9f97f27242011b031e2a9nvd
- git.kernel.org/stable/c/7f740bc696d4617f8ee44565e8ac0d36278a1e91nvd
- git.kernel.org/stable/c/afd9a31b5aa4b3747f382d44a7b03b7b5d0b7635nvd
- git.kernel.org/stable/c/baa60c66a310c50785289b0ede6fdce8ec3219c7nvd
- git.kernel.org/stable/c/e28f376dd8dfcc4e880ac101184132bc08703f6envd
- git.kernel.org/stable/c/e976988bc245ec3768cc0f76bed7d05488a7dd0fnvd
- git.kernel.org/stable/c/ea2b62f305893992156a798f665847e0663c9f41nvd
News mentions
0No linked articles in our index yet.