CVE-2026-23267
Race Condition in Linux Kernel F2FS Causes Checkpoint Flag Inconsistency
Publication date: 2026-03-18
Last updated on: 2026-03-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
| linux_kernel | f2fs | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a flag inconsistency issue in the Linux kernel's F2FS filesystem related to atomic commit and checkpoint writes. Specifically, during atomic file fsync operations, there is a race condition between two threads where one thread writes a checkpoint and sets a flag (IS_CHECKPOINTED) indicating completion, but the other thread does not see this flag set and attempts to write the same data again. This causes an -EINVAL error during recovery and inconsistent state in the filesystem metadata.
The problem arises because the IS_CHECKPOINTED flag is not properly set or checked due to concurrent operations, leading to redundant writes and potential data inconsistency. The fix involves ensuring that the node_write lock is properly acquired during atomic writes so that the IS_CHECKPOINTED flag correctly reflects the checkpoint write completion.
How can this vulnerability impact me? :
This vulnerability can cause errors (-EINVAL) during filesystem recovery and may lead to inconsistent filesystem metadata after reboot. In atomic write scenarios, it can cause redundant writes and potential corruption or instability in the F2FS filesystem.
Such inconsistencies could result in data loss or filesystem corruption, impacting system reliability and data integrity, especially in systems relying on atomic file operations.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know