CVE-2026-23265
Sanity Check Bypass in Linux f2fs Node Footer Causes Kernel Crash
Publication date: 2026-03-18
Last updated on: 2026-03-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, the primary step is to update the Linux kernel to a version where the fix for the f2fs node footer sanity check has been applied.
Until the kernel is updated, avoid using fuzzed or corrupted images on f2fs filesystems that could trigger corrupted node pages.
Regularly monitor kernel logs for signs of this bug to detect early symptoms and prevent system crashes.
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's f2fs filesystem implementation. It involves a lack of proper sanity checks on the node footer during asynchronous node page loading and writeback operations. Specifically, if the footer of a node page is corrupted, the system may load a corrupted node page without detecting the inconsistency between the node page index (nid) and the footer.nid. This can lead to a kernel bug triggered during the writeback of the node page.
How can this vulnerability impact me? :
The impact of this vulnerability is a kernel bug that can cause system instability or crashes when corrupted node pages are written back. This could potentially lead to data loss or system downtime if the filesystem becomes unstable due to this bug.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as a kernel BUG related to the f2fs filesystem, specifically triggered by inconsistencies between the node page index (nid) and the footer.nid of a node page.
Detection can involve monitoring kernel logs for BUG messages similar to the following call trace:
- kernel BUG at fs/f2fs/data.c:358!
- Call trace involving blk_update_request, blk_mq_end_request, and f2fs_write_end_io functions.
Commands to check kernel logs for such BUGs include:
- dmesg | grep -i 'kernel BUG'
- journalctl -k | grep -i 'f2fs' | grep -i 'BUG'
Additionally, monitoring for filesystem errors or crashes related to f2fs node page writeback may help detect this issue.