CVE-2026-43365 (GCVE-0-2026-43365)

Vulnerability from cvelistv5 – Published: 2026-05-08 14:21 – Updated: 2026-05-08 14:21
VLAI?
Title
xfs: fix undersized l_iclog_roundoff values
Summary
In the Linux kernel, the following vulnerability has been resolved: xfs: fix undersized l_iclog_roundoff values If the superblock doesn't list a log stripe unit, we set the incore log roundoff value to 512. This leads to corrupt logs and unmountable filesystems in generic/617 on a disk with 4k physical sectors... XFS (sda1): Mounting V5 Filesystem ff3121ca-26e6-4b77-b742-aaff9a449e1c XFS (sda1): Torn write (CRC failure) detected at log block 0x318e. Truncating head block from 0x3197. XFS (sda1): failed to locate log tail XFS (sda1): log mount/recovery failed: error -74 XFS (sda1): log mount failed XFS (sda1): Mounting V5 Filesystem ff3121ca-26e6-4b77-b742-aaff9a449e1c XFS (sda1): Ending clean mount ...on the current xfsprogs for-next which has a broken mkfs. xfs_info shows this... meta-data=/dev/sda1 isize=512 agcount=4, agsize=644992 blks = sectsz=4096 attr=2, projid32bit=1 = crc=1 finobt=1, sparse=1, rmapbt=1 = reflink=1 bigtime=1 inobtcount=1 nrext64=1 = exchange=1 metadir=1 data = bsize=4096 blocks=2579968, imaxpct=25 = sunit=0 swidth=0 blks naming =version 2 bsize=4096 ascii-ci=0, ftype=1, parent=1 log =internal log bsize=4096 blocks=16384, version=2 = sectsz=4096 sunit=0 blks, lazy-count=1 realtime =none extsz=4096 blocks=0, rtextents=0 = rgcount=0 rgsize=268435456 extents = zoned=0 start=0 reserved=0 ...observe that the log section has sectsz=4096 sunit=0, which means that the roundoff factor is 512, not 4096 as you'd expect. We should fix mkfs not to generate broken filesystems, but anyone can fuzz the ondisk superblock so we should be more cautious. I think the inadequate logic predates commit a6a65fef5ef8d0, but that's clearly going to require a different backport.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: a6a65fef5ef8d0a6a0ce514eb66b2f3dfa777b48 , < 5afae524f83d6a18517298491a5624cb0eae5029 (git)
Affected: a6a65fef5ef8d0a6a0ce514eb66b2f3dfa777b48 , < 2ecda4b83749c1fef0c9dea4fd5e8b513aba3e40 (git)
Affected: a6a65fef5ef8d0a6a0ce514eb66b2f3dfa777b48 , < 41e91dff2d3974730b5ee50daa8e27ec254cbf91 (git)
Affected: a6a65fef5ef8d0a6a0ce514eb66b2f3dfa777b48 , < e88ce9f0536f3b2149afb70625cfc4bd74a4ac6d (git)
Affected: a6a65fef5ef8d0a6a0ce514eb66b2f3dfa777b48 , < 446a1f5bb64ba38adb93cb043ff0f7b85e8937ca (git)
Affected: a6a65fef5ef8d0a6a0ce514eb66b2f3dfa777b48 , < 5e7148402dfc4a5b7894d8e97b15e5c2e70924aa (git)
Affected: a6a65fef5ef8d0a6a0ce514eb66b2f3dfa777b48 , < 52a8a1ba883defbfe3200baa22cf4cd21985d51a (git)
Create a notification for this product.
    Linux Linux Affected: 5.14
Unaffected: 0 , < 5.14 (semver)
Unaffected: 5.15.203 , ≤ 5.15.* (semver)
Unaffected: 6.1.167 , ≤ 6.1.* (semver)
Unaffected: 6.6.130 , ≤ 6.6.* (semver)
Unaffected: 6.12.78 , ≤ 6.12.* (semver)
Unaffected: 6.18.19 , ≤ 6.18.* (semver)
Unaffected: 6.19.9 , ≤ 6.19.* (semver)
Unaffected: 7.0 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "fs/xfs/xfs_log.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "5afae524f83d6a18517298491a5624cb0eae5029",
              "status": "affected",
              "version": "a6a65fef5ef8d0a6a0ce514eb66b2f3dfa777b48",
              "versionType": "git"
            },
            {
              "lessThan": "2ecda4b83749c1fef0c9dea4fd5e8b513aba3e40",
              "status": "affected",
              "version": "a6a65fef5ef8d0a6a0ce514eb66b2f3dfa777b48",
              "versionType": "git"
            },
            {
              "lessThan": "41e91dff2d3974730b5ee50daa8e27ec254cbf91",
              "status": "affected",
              "version": "a6a65fef5ef8d0a6a0ce514eb66b2f3dfa777b48",
              "versionType": "git"
            },
            {
              "lessThan": "e88ce9f0536f3b2149afb70625cfc4bd74a4ac6d",
              "status": "affected",
              "version": "a6a65fef5ef8d0a6a0ce514eb66b2f3dfa777b48",
              "versionType": "git"
            },
            {
              "lessThan": "446a1f5bb64ba38adb93cb043ff0f7b85e8937ca",
              "status": "affected",
              "version": "a6a65fef5ef8d0a6a0ce514eb66b2f3dfa777b48",
              "versionType": "git"
            },
            {
              "lessThan": "5e7148402dfc4a5b7894d8e97b15e5c2e70924aa",
              "status": "affected",
              "version": "a6a65fef5ef8d0a6a0ce514eb66b2f3dfa777b48",
              "versionType": "git"
            },
            {
              "lessThan": "52a8a1ba883defbfe3200baa22cf4cd21985d51a",
              "status": "affected",
              "version": "a6a65fef5ef8d0a6a0ce514eb66b2f3dfa777b48",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "fs/xfs/xfs_log.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.14"
            },
            {
              "lessThan": "5.14",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.203",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.167",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.130",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.78",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.18.*",
              "status": "unaffected",
              "version": "6.18.19",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.19.*",
              "status": "unaffected",
              "version": "6.19.9",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "7.0",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.203",
                  "versionStartIncluding": "5.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.167",
                  "versionStartIncluding": "5.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.130",
                  "versionStartIncluding": "5.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.78",
                  "versionStartIncluding": "5.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.18.19",
                  "versionStartIncluding": "5.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.19.9",
                  "versionStartIncluding": "5.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "7.0",
                  "versionStartIncluding": "5.14",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfs: fix undersized l_iclog_roundoff values\n\nIf the superblock doesn\u0027t list a log stripe unit, we set the incore log\nroundoff value to 512.  This leads to corrupt logs and unmountable\nfilesystems in generic/617 on a disk with 4k physical sectors...\n\nXFS (sda1): Mounting V5 Filesystem ff3121ca-26e6-4b77-b742-aaff9a449e1c\nXFS (sda1): Torn write (CRC failure) detected at log block 0x318e. Truncating head block from 0x3197.\nXFS (sda1): failed to locate log tail\nXFS (sda1): log mount/recovery failed: error -74\nXFS (sda1): log mount failed\nXFS (sda1): Mounting V5 Filesystem ff3121ca-26e6-4b77-b742-aaff9a449e1c\nXFS (sda1): Ending clean mount\n\n...on the current xfsprogs for-next which has a broken mkfs.  xfs_info\nshows this...\n\nmeta-data=/dev/sda1              isize=512    agcount=4, agsize=644992 blks\n         =                       sectsz=4096  attr=2, projid32bit=1\n         =                       crc=1        finobt=1, sparse=1, rmapbt=1\n         =                       reflink=1    bigtime=1 inobtcount=1 nrext64=1\n         =                       exchange=1   metadir=1\ndata     =                       bsize=4096   blocks=2579968, imaxpct=25\n         =                       sunit=0      swidth=0 blks\nnaming   =version 2              bsize=4096   ascii-ci=0, ftype=1, parent=1\nlog      =internal log           bsize=4096   blocks=16384, version=2\n         =                       sectsz=4096  sunit=0 blks, lazy-count=1\nrealtime =none                   extsz=4096   blocks=0, rtextents=0\n         =                       rgcount=0    rgsize=268435456 extents\n         =                       zoned=0      start=0 reserved=0\n\n...observe that the log section has sectsz=4096 sunit=0, which means\nthat the roundoff factor is 512, not 4096 as you\u0027d expect.  We should\nfix mkfs not to generate broken filesystems, but anyone can fuzz the\nondisk superblock so we should be more cautious.  I think the inadequate\nlogic predates commit a6a65fef5ef8d0, but that\u0027s clearly going to\nrequire a different backport."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-08T14:21:18.405Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/5afae524f83d6a18517298491a5624cb0eae5029"
        },
        {
          "url": "https://git.kernel.org/stable/c/2ecda4b83749c1fef0c9dea4fd5e8b513aba3e40"
        },
        {
          "url": "https://git.kernel.org/stable/c/41e91dff2d3974730b5ee50daa8e27ec254cbf91"
        },
        {
          "url": "https://git.kernel.org/stable/c/e88ce9f0536f3b2149afb70625cfc4bd74a4ac6d"
        },
        {
          "url": "https://git.kernel.org/stable/c/446a1f5bb64ba38adb93cb043ff0f7b85e8937ca"
        },
        {
          "url": "https://git.kernel.org/stable/c/5e7148402dfc4a5b7894d8e97b15e5c2e70924aa"
        },
        {
          "url": "https://git.kernel.org/stable/c/52a8a1ba883defbfe3200baa22cf4cd21985d51a"
        }
      ],
      "title": "xfs: fix undersized l_iclog_roundoff values",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2026-43365",
    "datePublished": "2026-05-08T14:21:18.405Z",
    "dateReserved": "2026-05-01T14:12:56.005Z",
    "dateUpdated": "2026-05-08T14:21:18.405Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2026-43365",
      "date": "2026-05-09",
      "epss": "0.00024",
      "percentile": "0.07036"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2026-43365\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-05-08T15:16:47.490\",\"lastModified\":\"2026-05-08T15:16:47.490\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nxfs: fix undersized l_iclog_roundoff values\\n\\nIf the superblock doesn\u0027t list a log stripe unit, we set the incore log\\nroundoff value to 512.  This leads to corrupt logs and unmountable\\nfilesystems in generic/617 on a disk with 4k physical sectors...\\n\\nXFS (sda1): Mounting V5 Filesystem ff3121ca-26e6-4b77-b742-aaff9a449e1c\\nXFS (sda1): Torn write (CRC failure) detected at log block 0x318e. Truncating head block from 0x3197.\\nXFS (sda1): failed to locate log tail\\nXFS (sda1): log mount/recovery failed: error -74\\nXFS (sda1): log mount failed\\nXFS (sda1): Mounting V5 Filesystem ff3121ca-26e6-4b77-b742-aaff9a449e1c\\nXFS (sda1): Ending clean mount\\n\\n...on the current xfsprogs for-next which has a broken mkfs.  xfs_info\\nshows this...\\n\\nmeta-data=/dev/sda1              isize=512    agcount=4, agsize=644992 blks\\n         =                       sectsz=4096  attr=2, projid32bit=1\\n         =                       crc=1        finobt=1, sparse=1, rmapbt=1\\n         =                       reflink=1    bigtime=1 inobtcount=1 nrext64=1\\n         =                       exchange=1   metadir=1\\ndata     =                       bsize=4096   blocks=2579968, imaxpct=25\\n         =                       sunit=0      swidth=0 blks\\nnaming   =version 2              bsize=4096   ascii-ci=0, ftype=1, parent=1\\nlog      =internal log           bsize=4096   blocks=16384, version=2\\n         =                       sectsz=4096  sunit=0 blks, lazy-count=1\\nrealtime =none                   extsz=4096   blocks=0, rtextents=0\\n         =                       rgcount=0    rgsize=268435456 extents\\n         =                       zoned=0      start=0 reserved=0\\n\\n...observe that the log section has sectsz=4096 sunit=0, which means\\nthat the roundoff factor is 512, not 4096 as you\u0027d expect.  We should\\nfix mkfs not to generate broken filesystems, but anyone can fuzz the\\nondisk superblock so we should be more cautious.  I think the inadequate\\nlogic predates commit a6a65fef5ef8d0, but that\u0027s clearly going to\\nrequire a different backport.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/2ecda4b83749c1fef0c9dea4fd5e8b513aba3e40\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/41e91dff2d3974730b5ee50daa8e27ec254cbf91\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/446a1f5bb64ba38adb93cb043ff0f7b85e8937ca\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/52a8a1ba883defbfe3200baa22cf4cd21985d51a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/5afae524f83d6a18517298491a5624cb0eae5029\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/5e7148402dfc4a5b7894d8e97b15e5c2e70924aa\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e88ce9f0536f3b2149afb70625cfc4bd74a4ac6d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…