Description
In the Linux kernel, the following vulnerability has been resolved:

minix: Add required sanity checking to minix_check_superblock()

The fs/minix implementation of the minix filesystem does not currently
support any other value for s_log_zone_size than 0. This is also the
only value supported in util-linux; see mkfs.minix.c line 511. In
addition, this patch adds some sanity checking for the other minix
superblock fields, and moves the minix_blocks_needed() checks for the
zmap and imap also to minix_check_super_block().

This also closes a related syzbot bug report.
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Minix filesystem support in the Linux kernel lacks input validation for critical superblock fields, notably s_log_zone_size. The kernel expects this field to be zero but accepts other values, and additional data fields lack sanity checking. A crafted superblock with invalid values can cause the kernel to calculate incorrect sizes and indices, leading to memory corruption or a crash. This would result in a denial‑of‑service by unconditionally crashing the host during a mount operation.

Affected Systems

All Linux kernel distributions that still use the unmodified fs/minix implementation are affected. The vulnerability is present in kernel versions prior to the application of the commit that adds sanity checks and potentially in util‑linux utility versions that generate Minix superblocks without enforcing the zero s_log_zone_size rule. The exact affected releases are not enumerated, but any pre‑patch kernel with the vulnerable code path is at risk.

Risk and Exploitability

Official security metrics are not published; no CVSS or EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. The absence of input validation suggests that crafting a malicious superblock would be relatively straightforward, but the lack of a documented exploit and KEV status indicates no confirmed exploitation in the wild. Nonetheless, the potential to crash the kernel during a mount operation makes the vulnerability high‑impact from an availability standpoint.

Generated by OpenCVE AI on May 6, 2026 at 16:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install a Linux kernel version that includes the minix_check_superblock sanity‑check patch.
  • Upgrade util‑linux to a version that enforces s_log_zone_size is zero when creating Minix filesystems.
  • If Minix support is unnecessary, disable the minix filesystem in the kernel configuration or unload the module.
  • Avoid mounting Minix volumes from unknown or untrusted sources until the official fix is applied.

Generated by OpenCVE AI on May 6, 2026 at 16:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 16:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: minix: Add required sanity checking to minix_check_superblock() The fs/minix implementation of the minix filesystem does not currently support any other value for s_log_zone_size than 0. This is also the only value supported in util-linux; see mkfs.minix.c line 511. In addition, this patch adds some sanity checking for the other minix superblock fields, and moves the minix_blocks_needed() checks for the zmap and imap also to minix_check_super_block(). This also closes a related syzbot bug report.
Title minix: Add required sanity checking to minix_check_superblock()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:28:12.965Z

Reserved: 2026-05-01T14:12:55.993Z

Link: CVE-2026-43209

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:40.283

Modified: 2026-05-06T13:07:51.607

Link: CVE-2026-43209

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T17:15:08Z

Weaknesses