GHSA-H2VP-F72R-628F
Vulnerability from github – Published: 2026-05-06 12:30 – Updated: 2026-05-11 21:31
VLAI?
Details
In the Linux kernel, the following vulnerability has been resolved:
minix: Add required sanity checking to minix_check_superblock()
The fs/minix implementation of the minix filesystem does not currently support any other value for s_log_zone_size than 0. This is also the only value supported in util-linux; see mkfs.minix.c line 511. In addition, this patch adds some sanity checking for the other minix superblock fields, and moves the minix_blocks_needed() checks for the zmap and imap also to minix_check_super_block().
This also closes a related syzbot bug report.
Severity ?
5.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2026-43209"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-05-06T12:16:40Z",
"severity": "MODERATE"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nminix: Add required sanity checking to minix_check_superblock()\n\nThe fs/minix implementation of the minix filesystem does not currently\nsupport any other value for s_log_zone_size than 0. This is also the\nonly value supported in util-linux; see mkfs.minix.c line 511. In\naddition, this patch adds some sanity checking for the other minix\nsuperblock fields, and moves the minix_blocks_needed() checks for the\nzmap and imap also to minix_check_super_block().\n\nThis also closes a related syzbot bug report.",
"id": "GHSA-h2vp-f72r-628f",
"modified": "2026-05-11T21:31:30Z",
"published": "2026-05-06T12:30:33Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-43209"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/1efc128ee4adbc23e082715425ff895449d233bc"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/2bb588cede1c1969e49c0a2822c8cb8b346b7682"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/31fefc18096cdc5549cfa54964d90e0b3229aedc"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/66c7c239c65341f99ae388d4d53dc9df2bcb9925"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/8c97a6ddc95690a938ded44b4e3202f03f15078c"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/a051ecf5c5b0387840dc210413ed3bc7fbdaa69c"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/d791c544efd6b9c944b43cf7f502e5bcb02fb941"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/f57ccd4657c7f082dc47e5b9e18a883bb5f9118f"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…