DEBIAN-CVE-2026-23224

Source
https://security-tracker.debian.org/tracker/CVE-2026-23224
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-23224.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2026-23224
Upstream
Downstream
Published
2026-02-18T16:22:32.143Z
Modified
2026-02-23T17:15:58.292851Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: erofs: fix UAF issue for file-backed mounts w/ directio option [ 9.269940][ T3222] Call trace: [ 9.269948][ T3222] ext4filereaditer+0xac/0x108 [ 9.269979][ T3222] vfsiocbiterread+0xac/0x198 [ 9.269993][ T3222] erofsfileiorqsubmit+0x12c/0x180 [ 9.270008][ T3222] erofsfileiosubmitbio+0x14/0x24 [ 9.270030][ T3222] zerofsrunqueue+0x834/0x8ac [ 9.270054][ T3222] zerofsreadfolio+0x120/0x220 [ 9.270083][ T3222] filemapreadfolio+0x60/0x120 [ 9.270102][ T3222] filemapfault+0xcac/0x1060 [ 9.270119][ T3222] doptemissing+0x2d8/0x1554 [ 9.270131][ T3222] handlemmfault+0x5ec/0x70c [ 9.270142][ T3222] dopagefault+0x178/0x88c [ 9.270167][ T3222] dotranslationfault+0x38/0x54 [ 9.270183][ T3222] domemabort+0x54/0xac [ 9.270208][ T3222] el0da+0x44/0x7c [ 9.270227][ T3222] el0t64synchandler+0x5c/0xf4 [ 9.270253][ T3222] el0t64sync+0x1bc/0x1c0 EROFS may encounter above panic when enabling file-backed mount w/ directio mount option, the root cause is it may suffer UAF in below race condition: - zerofsreadfolio wq sdiodonewq - zerofsrunqueue - erofsfileiosubmitbio - erofsfileiorqsubmit - vfsiocbiterread - ext4filereaditer - ext4dioreaditer - iomapdiorw : bio was submitted and return -EIOCBQUEUED - dioaiocompletework - diocomplete - dio->iocb->kicomplete (erofsfileiokicomplete()) - kfree(rq) : it frees iocb, iocb.kifilp can be UAF in fileaccessed(). - fileaccessed : access NULL file point Introduce a reference count in struct erofsfileiorq, and initialize it as two, both erofsfileiokicomplete() and erofsfileiorqsubmit() will decrease reference count, the last one decreasing the reference count to zero will free rq.

References

Affected packages

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.12.73-1

Affected versions

6.*
6.12.38-1
6.12.41-1
6.12.43-1~bpo12+1
6.12.43-1
6.12.48-1
6.12.57-1~bpo12+1
6.12.57-1
6.12.63-1~bpo12+1
6.12.63-1
6.12.69-1~bpo12+1
6.12.69-1
6.12.73-1~bpo12+1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-23224.json"

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.18.12-1

Affected versions

6.*
6.12.38-1
6.12.41-1
6.12.43-1~bpo12+1
6.12.43-1
6.12.48-1
6.12.57-1~bpo12+1
6.12.57-1
6.12.63-1~bpo12+1
6.12.63-1
6.12.69-1~bpo12+1
6.12.69-1
6.12.73-1~bpo12+1
6.12.73-1
6.13~rc6-1~exp1
6.13~rc7-1~exp1
6.13.2-1~exp1
6.13.3-1~exp1
6.13.4-1~exp1
6.13.5-1~exp1
6.13.6-1~exp1
6.13.7-1~exp1
6.13.8-1~exp1
6.13.9-1~exp1
6.13.10-1~exp1
6.13.11-1~exp1
6.14.3-1~exp1
6.14.5-1~exp1
6.14.6-1~exp1
6.15~rc7-1~exp1
6.15-1~exp1
6.15.1-1~exp1
6.15.2-1~exp1
6.15.3-1~exp1
6.15.4-1~exp1
6.15.5-1~exp1
6.15.6-1~exp1
6.16~rc7-1~exp1
6.16-1~exp1
6.16.1-1~exp1
6.16.3-1~bpo13+1
6.16.3-1
6.16.5-1
6.16.6-1
6.16.7-1
6.16.8-1
6.16.9-1
6.16.10-1
6.16.11-1
6.16.12-1~bpo13+1
6.16.12-1
6.16.12-2
6.17.2-1~exp1
6.17.5-1~exp1
6.17.6-1
6.17.7-1
6.17.7-2
6.17.8-1~bpo13+1
6.17.8-1
6.17.9-1
6.17.10-1
6.17.11-1
6.17.12-1
6.17.13-1~bpo13+1
6.17.13-1
6.18~rc4-1~exp1
6.18~rc4-1~exp2
6.18~rc5-1~exp1
6.18~rc6-1~exp1
6.18~rc7-1~exp1
6.18.1-1~exp1
6.18.2-1~exp1
6.18.3-1
6.18.5-1~bpo13+1
6.18.5-1
6.18.8-1
6.18.9-1~bpo13+1
6.18.9-1
6.18.10-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-23224.json"