Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2525 articles · 106173 vulns · 38/41 feeds (7d)
← Back to list
7.8
CVE-2026-23234PATCHED
linux · linux_kernel

In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid UAF in f2fs_write_end_io() As syzbot reported an use-after-free issue in f2fs_write_end_io(). It is caused by

Description

In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid UAF in f2fs_write_end_io() As syzbot reported an use-after-free issue in f2fs_write_end_io(). It is caused by below race condition: loop device umount - worker_thread - loop_process_work - do_req_filebacked - lo_rw_aio - lo_rw_aio_complete - blk_mq_end_request - blk_update_request - f2fs_write_end_io - dec_page_count - folio_end_writeback - kill_f2fs_super - kill_block_super - f2fs_put_super : free(sbi) : get_pages(, F2FS_WB_CP_DATA) accessed sbi which is freed In kill_f2fs_super(), we will drop all page caches of f2fs inodes before call free(sbi), it guarantee that all folios should end its writeback, so it should be safe to access sbi before last folio_end_writeback(). Let's relocate ckpt thread wakeup flow before folio_end_writeback() to resolve this issue.

Affected Products

VendorProductVersions
linuxlinux_kernel< 5.10.251, < 5.15.201, < 6.1.164, < 6.6.127, < 6.12.74, < 6.18.13, < 6.19.3

References

  • https://git.kernel.org/stable/c/0fb58aff0dafd6837cc91f4154f3ed6e020358fa(Patch)
  • https://git.kernel.org/stable/c/2f67ff1e15a8a4d0e4ffc6564ab20d03d7398fe9(Patch)
  • https://git.kernel.org/stable/c/505e1c0530db6152cab3feef8e3e4da3d3e358c9(Patch)
  • https://git.kernel.org/stable/c/995030be4ce6338c6ff814583c14166446a64008(Patch)
  • https://git.kernel.org/stable/c/a42f99be8a16b32a0bb91bb6dda212a6ad61be5d(Patch)
  • https://git.kernel.org/stable/c/acc2c97fc0005846e5cf11b5ba3189fef130c9b3(Patch)
  • https://git.kernel.org/stable/c/ce2739e482bce8d2c014d76c4531c877f382aa54(Patch)
  • https://git.kernel.org/stable/c/cf4a9e1bc8129eb63fda5f8bdcd8d87f0bd76f42(Patch)

Related News (2 articles)

Tier B
BSI Advisories10h ago
[UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
→ No new info (linked only)
Tier A
Microsoft MSRC4d ago
CVE-2026-23234 f2fs: fix to avoid UAF in f2fs_write_end_io()
→ No new info (linked only)
CVSS 3.17.8 HIGH
VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA KEV❌ No
Actively exploited❌ No
Patch availablehttps://git.kernel.org/stable/c/0fb58aff0dafd6837cc91f4154f3ed6e020358fa, https://git.kernel.org/stable/c/2f67ff1e15a8a4d0e4ffc6564ab20d03d7398fe9, https://git.kernel.org/stable/c/505e1c0530db6152cab3feef8e3e4da3d3e358c9, https://git.kernel.org/stable/c/995030be4ce6338c6ff814583c14166446a64008, https://git.kernel.org/stable/c/a42f99be8a16b32a0bb91bb6dda212a6ad61be5d, https://git.kernel.org/stable/c/acc2c97fc0005846e5cf11b5ba3189fef130c9b3, https://git.kernel.org/stable/c/ce2739e482bce8d2c014d76c4531c877f382aa54, https://git.kernel.org/stable/c/cf4a9e1bc8129eb63fda5f8bdcd8d87f0bd76f42
CWECWE-416
PublishedMar 4, 2026
Last enriched4d ago
Trending Score37
Source articles2
Independent2
Info Completeness8/14
Missing: epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-23269EXP
In the Linux kernel, the following vulnerability has been resolved: apparmor: validate DFA start states are in bounds in unpack_pdb Start states are read from untrusted data and used as indexes into
Trending: 69
CRITICALCVE-2026-23400EXP
rust_binder: call set_notification_done() without proc lock
Trending: 51
CRITICALCVE-2026-23399EXP
nf_tables: nft_dynset: fix possible stateful expression memleak in error path
Trending: 48
HIGHCVE-2026-23235
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix out-of-bounds access in sysfs attribute read/write Some f2fs sysfs attributes suffer from out-of-bounds memory access an
Trending: 37
HIGHCVE-2026-23233
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid mapping wrong physical block for swapfile Xiaolong Guo reported a f2fs bug in bugzilla [1] [1] https://bugzill
Trending: 37

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Vulnerability Timeline

CVE Published
Mar 4, 2026
Patch Available
Mar 17, 2026
Discovered by ZDM
Mar 26, 2026