Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2524 articles · 106173 vulns · 38/41 feeds (7d)
← Back to list
7.1
CVE-2026-23235PATCHED
linux · linux_kernel

In the Linux kernel, the following vulnerability has been resolved: f2fs: fix out-of-bounds access in sysfs attribute read/write Some f2fs sysfs attributes suffer from out-of-bounds memory access an

Description

In the Linux kernel, the following vulnerability has been resolved: f2fs: fix out-of-bounds access in sysfs attribute read/write Some f2fs sysfs attributes suffer from out-of-bounds memory access and incorrect handling of integer values whose size is not 4 bytes. For example: vm:~# echo 65537 > /sys/fs/f2fs/vde/carve_out vm:~# cat /sys/fs/f2fs/vde/carve_out 65537 vm:~# echo 4294967297 > /sys/fs/f2fs/vde/atgc_age_threshold vm:~# cat /sys/fs/f2fs/vde/atgc_age_threshold 1 carve_out maps to {struct f2fs_sb_info}->carve_out, which is a 8-bit integer. However, the sysfs interface allows setting it to a value larger than 255, resulting in an out-of-range update. atgc_age_threshold maps to {struct atgc_management}->age_threshold, which is a 64-bit integer, but its sysfs interface cannot correctly set values larger than UINT_MAX. The root causes are: 1. __sbi_store() treats all default values as unsigned int, which prevents updating integers larger than 4 bytes and causes out-of-bounds writes for integers smaller than 4 bytes. 2. f2fs_sbi_show() also assumes all default values are unsigned int, leading to out-of-bounds reads and incorrect access to integers larger than 4 bytes. This patch introduces {struct f2fs_attr}->size to record the actual size of the integer associated with each sysfs attribute. With this information, sysfs read and write operations can correctly access and update values according to their real data size, avoiding memory corruption and truncation.

Affected Products

VendorProductVersions
linuxlinux_kernel< 5.10.251, < 5.15.201, < 6.1.164, < 6.6.127, < 6.12.74, < 6.18.13, < 6.19.3

References

  • https://git.kernel.org/stable/c/3a905e183c047577b154f08a78ac3039e9454703(Patch)
  • https://git.kernel.org/stable/c/438a405fbad6882df0e34b3e1a16839a71f04240(Patch)
  • https://git.kernel.org/stable/c/4ef30b9f1641c9e877792df6b049f1cf507d002d(Patch)
  • https://git.kernel.org/stable/c/6a6c07a9b49e43f0df42d7118fc76aa555c73d98(Patch)
  • https://git.kernel.org/stable/c/98ea0039dbfdd00e5cc1b9a8afa40434476c0955(Patch)
  • https://git.kernel.org/stable/c/d4a594dd952df123cbdcdee9b9640d9d55e4a954(Patch)
  • https://git.kernel.org/stable/c/e85a99db9ab85dfc30d93b0ca0e9156f3127f55a(Patch)
  • https://git.kernel.org/stable/c/eebd72cff518ac87e660aefb8a41224bd88c32ce(Patch)

Related News (2 articles)

Tier B
BSI Advisories10h ago
[UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
→ No new info (linked only)
Tier A
Microsoft MSRC4d ago
CVE-2026-23235 f2fs: fix out-of-bounds access in sysfs attribute read/write
→ No new info (linked only)
CVSS 3.17.1 HIGH
VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
CISA KEV❌ No
Actively exploited❌ No
Patch availablehttps://git.kernel.org/stable/c/3a905e183c047577b154f08a78ac3039e9454703, https://git.kernel.org/stable/c/438a405fbad6882df0e34b3e1a16839a71f04240, https://git.kernel.org/stable/c/4ef30b9f1641c9e877792df6b049f1cf507d002d, https://git.kernel.org/stable/c/6a6c07a9b49e43f0df42d7118fc76aa555c73d98, https://git.kernel.org/stable/c/98ea0039dbfdd00e5cc1b9a8afa40434476c0955, https://git.kernel.org/stable/c/d4a594dd952df123cbdcdee9b9640d9d55e4a954, https://git.kernel.org/stable/c/e85a99db9ab85dfc30d93b0ca0e9156f3127f55a, https://git.kernel.org/stable/c/eebd72cff518ac87e660aefb8a41224bd88c32ce
CWECWE-125
PublishedMar 4, 2026
Last enriched4d ago
Trending Score37
Source articles2
Independent2
Info Completeness8/14
Missing: epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-23269EXP
In the Linux kernel, the following vulnerability has been resolved: apparmor: validate DFA start states are in bounds in unpack_pdb Start states are read from untrusted data and used as indexes into
Trending: 69
CRITICALCVE-2026-23400EXP
rust_binder: call set_notification_done() without proc lock
Trending: 51
CRITICALCVE-2026-23399EXP
nf_tables: nft_dynset: fix possible stateful expression memleak in error path
Trending: 48
HIGHCVE-2026-23234
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid UAF in f2fs_write_end_io() As syzbot reported an use-after-free issue in f2fs_write_end_io(). It is caused by
Trending: 37
HIGHCVE-2026-23233
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid mapping wrong physical block for swapfile Xiaolong Guo reported a f2fs bug in bugzilla [1] [1] https://bugzill
Trending: 37

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Vulnerability Timeline

CVE Published
Mar 4, 2026
Patch Available
Mar 17, 2026
Discovered by ZDM
Mar 26, 2026