CVE-2026-43209
minix: Add required sanity checking to minix_check_superblock()
Description
In the Linux kernel, the following vulnerability has been resolved: minix: Add required sanity checking to minix_check_superblock() The fs/minix implementation of the minix filesystem does not currently support any other value for s_log_zone_size than 0. This is also the only value supported in util-linux; see mkfs.minix.c line 511. In addition, this patch adds some sanity checking for the other minix superblock fields, and moves the minix_blocks_needed() checks for the zmap and imap also to minix_check_super_block(). This also closes a related syzbot bug report.
INFO
Published Date :
May 6, 2026, 12:16 p.m.
Last Modified :
May 6, 2026, 1:07 p.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Solution
- Update the Linux kernel.
- Apply the minix filesystem patch.
- Ensure s_log_zone_size is set to 0.
- Verify superblock sanity checks.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2026-43209.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2026-43209 is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2026-43209
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2026-43209 vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2026-43209 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
May. 06, 2026
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: minix: Add required sanity checking to minix_check_superblock() The fs/minix implementation of the minix filesystem does not currently support any other value for s_log_zone_size than 0. This is also the only value supported in util-linux; see mkfs.minix.c line 511. In addition, this patch adds some sanity checking for the other minix superblock fields, and moves the minix_blocks_needed() checks for the zmap and imap also to minix_check_super_block(). This also closes a related syzbot bug report. Added Reference https://git.kernel.org/stable/c/1efc128ee4adbc23e082715425ff895449d233bc Added Reference https://git.kernel.org/stable/c/2bb588cede1c1969e49c0a2822c8cb8b346b7682 Added Reference https://git.kernel.org/stable/c/31fefc18096cdc5549cfa54964d90e0b3229aedc Added Reference https://git.kernel.org/stable/c/66c7c239c65341f99ae388d4d53dc9df2bcb9925 Added Reference https://git.kernel.org/stable/c/8c97a6ddc95690a938ded44b4e3202f03f15078c Added Reference https://git.kernel.org/stable/c/a051ecf5c5b0387840dc210413ed3bc7fbdaa69c Added Reference https://git.kernel.org/stable/c/d791c544efd6b9c944b43cf7f502e5bcb02fb941 Added Reference https://git.kernel.org/stable/c/f57ccd4657c7f082dc47e5b9e18a883bb5f9118f