0.0
NA
CVE-2026-43268
hfsplus: pretend special inodes as regular files
Description

In the Linux kernel, the following vulnerability has been resolved: hfsplus: pretend special inodes as regular files Since commit af153bb63a33 ("vfs: catch invalid modes in may_open()") requires any inode be one of S_IFDIR/S_IFLNK/S_IFREG/S_IFCHR/S_IFBLK/ S_IFIFO/S_IFSOCK type, use S_IFREG for special inodes.

INFO

Published Date :

May 6, 2026, 12:16 p.m.

Last Modified :

May 6, 2026, 1:07 p.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products

The following products are affected by CVE-2026-43268 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

No affected product recoded yet

Solution
Update the Linux kernel to resolve the issue with special inodes.
  • Update the Linux kernel.
  • Apply commit af153bb63a33.
  • Ensure special inodes are treated as regular files.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2026-43268 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2026-43268 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2026-43268 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2026-43268 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    May. 06, 2026

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: hfsplus: pretend special inodes as regular files Since commit af153bb63a33 ("vfs: catch invalid modes in may_open()") requires any inode be one of S_IFDIR/S_IFLNK/S_IFREG/S_IFCHR/S_IFBLK/ S_IFIFO/S_IFSOCK type, use S_IFREG for special inodes.
    Added Reference https://git.kernel.org/stable/c/67407d6abc9520a8a4661285b3ed294eb73ff6e7
    Added Reference https://git.kernel.org/stable/c/676bc99d0b3e356cdfec5d8204518e1aac14ec84
    Added Reference https://git.kernel.org/stable/c/799c492a619a10322543d13e6d2a6d27335c868c
    Added Reference https://git.kernel.org/stable/c/9353d4ee26dc33f6ada1646e84660f4c59189763
    Added Reference https://git.kernel.org/stable/c/d209ebaee93fc5089101d34d1b38a91d7abb03fd
    Added Reference https://git.kernel.org/stable/c/dcac5582f90b55a267d89769073c5651990b2ec5
    Added Reference https://git.kernel.org/stable/c/de9affb698d5034888314880736925c39d6d048e
    Added Reference https://git.kernel.org/stable/c/ed8889ca21b6ab37bc1435c4009ce37a79acb9e6
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.