SB2026032085 - Type conversion in Linux kernel f2fs
Published: March 20, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Type conversion (CVE-ID: CVE-2026-23265)
The vulnerability allows a local user to cause a denial of service.
The vulnerability exists due to improper input validation in the f2fs file system's node footer handling when processing node pages with corrupted footers. A local user can provide a specially crafted f2fs image containing corrupted node page footers to cause a denial of service.
Exploitation requires access to a fuzzed or malicious f2fs image and the ability to trigger asynchronous node page reads, such as via f2fs_ra_node_pages(). The system must load and process the corrupted node page, which later triggers a kernel BUG during writeback.
Remediation
Install update from vendor's website.