0.0
NA
CVE-2026-43209
minix: Add required sanity checking to minix_check_superblock()
Description

In the Linux kernel, the following vulnerability has been resolved: minix: Add required sanity checking to minix_check_superblock() The fs/minix implementation of the minix filesystem does not currently support any other value for s_log_zone_size than 0. This is also the only value supported in util-linux; see mkfs.minix.c line 511. In addition, this patch adds some sanity checking for the other minix superblock fields, and moves the minix_blocks_needed() checks for the zmap and imap also to minix_check_super_block(). This also closes a related syzbot bug report.

INFO

Published Date :

May 6, 2026, 12:16 p.m.

Last Modified :

May 6, 2026, 1:07 p.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products

The following products are affected by CVE-2026-43209 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel
Solution
Update the Linux kernel to include superblock sanity checking.
  • Update the Linux kernel.
  • Apply the minix filesystem patch.
  • Ensure s_log_zone_size is set to 0.
  • Verify superblock sanity checks.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2026-43209 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2026-43209 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2026-43209 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2026-43209 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    May. 06, 2026

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: minix: Add required sanity checking to minix_check_superblock() The fs/minix implementation of the minix filesystem does not currently support any other value for s_log_zone_size than 0. This is also the only value supported in util-linux; see mkfs.minix.c line 511. In addition, this patch adds some sanity checking for the other minix superblock fields, and moves the minix_blocks_needed() checks for the zmap and imap also to minix_check_super_block(). This also closes a related syzbot bug report.
    Added Reference https://git.kernel.org/stable/c/1efc128ee4adbc23e082715425ff895449d233bc
    Added Reference https://git.kernel.org/stable/c/2bb588cede1c1969e49c0a2822c8cb8b346b7682
    Added Reference https://git.kernel.org/stable/c/31fefc18096cdc5549cfa54964d90e0b3229aedc
    Added Reference https://git.kernel.org/stable/c/66c7c239c65341f99ae388d4d53dc9df2bcb9925
    Added Reference https://git.kernel.org/stable/c/8c97a6ddc95690a938ded44b4e3202f03f15078c
    Added Reference https://git.kernel.org/stable/c/a051ecf5c5b0387840dc210413ed3bc7fbdaa69c
    Added Reference https://git.kernel.org/stable/c/d791c544efd6b9c944b43cf7f502e5bcb02fb941
    Added Reference https://git.kernel.org/stable/c/f57ccd4657c7f082dc47e5b9e18a883bb5f9118f
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.