CVE-2026-43365
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
08/05/2026
Last modified:
12/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
xfs: fix undersized l_iclog_roundoff values<br />
<br />
If the superblock doesn&#39;t list a log stripe unit, we set the incore log<br />
roundoff value to 512. This leads to corrupt logs and unmountable<br />
filesystems in generic/617 on a disk with 4k physical sectors...<br />
<br />
XFS (sda1): Mounting V5 Filesystem ff3121ca-26e6-4b77-b742-aaff9a449e1c<br />
XFS (sda1): Torn write (CRC failure) detected at log block 0x318e. Truncating head block from 0x3197.<br />
XFS (sda1): failed to locate log tail<br />
XFS (sda1): log mount/recovery failed: error -74<br />
XFS (sda1): log mount failed<br />
XFS (sda1): Mounting V5 Filesystem ff3121ca-26e6-4b77-b742-aaff9a449e1c<br />
XFS (sda1): Ending clean mount<br />
<br />
...on the current xfsprogs for-next which has a broken mkfs. xfs_info<br />
shows this...<br />
<br />
meta-data=/dev/sda1 isize=512 agcount=4, agsize=644992 blks<br />
= sectsz=4096 attr=2, projid32bit=1<br />
= crc=1 finobt=1, sparse=1, rmapbt=1<br />
= reflink=1 bigtime=1 inobtcount=1 nrext64=1<br />
= exchange=1 metadir=1<br />
data = bsize=4096 blocks=2579968, imaxpct=25<br />
= sunit=0 swidth=0 blks<br />
naming =version 2 bsize=4096 ascii-ci=0, ftype=1, parent=1<br />
log =internal log bsize=4096 blocks=16384, version=2<br />
= sectsz=4096 sunit=0 blks, lazy-count=1<br />
realtime =none extsz=4096 blocks=0, rtextents=0<br />
= rgcount=0 rgsize=268435456 extents<br />
= zoned=0 start=0 reserved=0<br />
<br />
...observe that the log section has sectsz=4096 sunit=0, which means<br />
that the roundoff factor is 512, not 4096 as you&#39;d expect. We should<br />
fix mkfs not to generate broken filesystems, but anyone can fuzz the<br />
ondisk superblock so we should be more cautious. I think the inadequate<br />
logic predates commit a6a65fef5ef8d0, but that&#39;s clearly going to<br />
require a different backport.
Impact
Base Score 3.x
8.20
Severity 3.x
HIGH
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2ecda4b83749c1fef0c9dea4fd5e8b513aba3e40
- https://git.kernel.org/stable/c/41e91dff2d3974730b5ee50daa8e27ec254cbf91
- https://git.kernel.org/stable/c/446a1f5bb64ba38adb93cb043ff0f7b85e8937ca
- https://git.kernel.org/stable/c/52a8a1ba883defbfe3200baa22cf4cd21985d51a
- https://git.kernel.org/stable/c/5afae524f83d6a18517298491a5624cb0eae5029
- https://git.kernel.org/stable/c/5e7148402dfc4a5b7894d8e97b15e5c2e70924aa
- https://git.kernel.org/stable/c/e88ce9f0536f3b2149afb70625cfc4bd74a4ac6d



