The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-23267

CVE-2026-23267: Linux Kernel Race Condition Vulnerability

CVE-2026-23267 is a race condition vulnerability in the Linux kernel F2FS filesystem affecting concurrent atomic commit and checkpoint writes. This article covers the technical details, affected versions, and mitigation.

Published: March 20, 2026

CVE-2026-23267 Overview

A race condition vulnerability has been identified in the Linux kernel's F2FS (Flash-Friendly File System) subsystem. The issue stems from an IS_CHECKPOINTED flag inconsistency caused by concurrent atomic commit and checkpoint write operations. During Sudden Power Off (SPO) testing, when mounting F2FS, an -EINVAL error was returned from f2fs_recover_inode_page due to improper synchronization between threads performing atomic file sync operations and checkpoint writes.

Critical Impact

This vulnerability can cause filesystem inconsistencies and mount failures after unexpected power loss events, potentially leading to data integrity issues on systems using F2FS.

Affected Products

  • Linux kernel with F2FS filesystem support
  • Systems utilizing F2FS atomic write operations
  • Flash storage devices with F2FS formatting

Discovery Timeline

  • 2026-03-18 - CVE-2026-23267 published to NVD
  • 2026-03-19 - Last updated in NVD database

Technical Details for CVE-2026-23267

Vulnerability Analysis

This vulnerability manifests as a race condition between two concurrent threads executing F2FS filesystem operations. The issue occurs when Thread A performs f2fs_ioc_commit_atomic_write while Thread B concurrently executes f2fs_write_checkpoint. The timing window between folio_lock(last_folio) scheduling and checkpoint operations creates a state where the IS_CHECKPOINTED flag in the nat_entry structure becomes inconsistent with the actual checkpoint state.

When Thread A calls f2fs_need_dentry_mark(sbi, ino), the last_folio has already been written once by Thread B's checkpoint operation. However, because the {struct nat_entry}->flag did not have the IS_CHECKPOINTED bit set at the critical check point, Thread A proceeds to call set_dentry_mark(last_folio, 1) and writes the folio again after Thread B has completed f2fs_write_checkpoint. This results in a post-SPO state where {struct node_info}->blk_addr is not NULL_ADDR because Thread B's checkpoint was successfully written, but the filesystem metadata is inconsistent.

Root Cause

The root cause lies in insufficient locking during atomic file fsync operations. The sbi->node_write semaphore is acquired too late in the __write_node_folio path, creating a window where the checkpoint operation can complete and set the IS_CHECKPOINTED flag while the atomic write thread is still holding stale state information. For regular file fsync operations, the folio must be dirty and the checkpoint process waits for dirty node page submissions to complete. However, atomic write scenarios bypass this safeguard, allowing the race condition to manifest.

Attack Vector

This vulnerability is triggered by specific internal filesystem operations during concurrent atomic commits and checkpoint writes. The attack vector is local and requires the ability to perform filesystem operations on an F2FS-mounted volume. While not directly exploitable for code execution, the race condition can cause filesystem corruption and denial of service through mount failures.

The vulnerability condition occurs when:

  1. An atomic write operation initiates f2fs_do_sync_file with atomic flag set
  2. A concurrent checkpoint operation executes block_operations and writes back the folio
  3. The atomic write thread schedules before acquiring folio_lock, allowing the checkpoint to proceed
  4. The checkpoint sets IS_CHECKPOINTED flag in NAT entries
  5. The atomic write thread then writes the folio again with incorrect dentry marks
  6. A sudden power off occurs, leaving the filesystem in an inconsistent state

Detection Methods for CVE-2026-23267

Indicators of Compromise

  • F2FS mount failures with -EINVAL error from f2fs_recover_inode_page
  • Kernel log messages indicating NAT entry or checkpoint inconsistencies
  • Unexpected filesystem recovery triggers after normal shutdowns
  • Corruption detected in atomic write files after power events

Detection Strategies

  • Monitor kernel logs for F2FS recovery errors during mount operations
  • Implement filesystem integrity checks after unexpected power loss events
  • Track atomic write operations and checkpoint timing through kernel tracing
  • Use dmesg filtering for F2FS-related error messages

Monitoring Recommendations

  • Enable F2FS debug logging to capture checkpoint and atomic write operation timing
  • Implement automated filesystem consistency checks in boot scripts for F2FS volumes
  • Deploy kernel event monitoring for race condition indicators in the F2FS subsystem

How to Mitigate CVE-2026-23267

Immediate Actions Required

  • Apply the latest Linux kernel patches containing the F2FS fix
  • Consider temporarily avoiding atomic write operations on critical F2FS volumes
  • Ensure proper UPS or power protection for systems using F2FS with atomic writes
  • Schedule maintenance windows to update affected kernel versions

Patch Information

The Linux kernel development team has released patches across multiple stable branches to address this vulnerability. The fix ensures that for atomic file fsync operations, sbi->node_write is acquired through __write_node_folio to guarantee the IS_CHECKPOINTED flag correctly indicates checkpoint write completion status.

Patches are available through the following kernel commits:

  • Linux Kernel Commit 32bc3c9
  • Linux Kernel Commit 75e19da
  • Linux Kernel Commit 7633a73
  • Linux Kernel Commit 962c167
  • Linux Kernel Commit bd66b4c
  • Linux Kernel Commit ed81bc5

Workarounds

  • Avoid using atomic write operations on F2FS filesystems until patched
  • Implement application-level data integrity checks for critical data on F2FS volumes
  • Consider using alternative filesystems (ext4, XFS) for workloads requiring atomic write semantics
  • Deploy power protection systems to minimize SPO events on affected systems
bash
# Check current kernel version for F2FS support
uname -r

# View F2FS mount status and options
mount | grep f2fs

# Check kernel logs for F2FS errors
dmesg | grep -i f2fs

# Update kernel packages (Debian/Ubuntu)
sudo apt update && sudo apt upgrade linux-image-generic

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRace Condition

  • Vendor/TechLinux Kernel

  • SeverityNONE

  • CVSS ScoreN/A

  • EPSS Probability0.02%

  • Known ExploitedNo
  • Impact Assessment
  • ConfidentialityNone
  • IntegrityNone
  • AvailabilityNone
  • Technical References
  • Linux Kernel Commit 32bc3c9

  • Linux Kernel Commit 75e19da

  • Linux Kernel Commit 7633a73

  • Linux Kernel Commit 962c167

  • Linux Kernel Commit bd66b4c

  • Linux Kernel Commit ed81bc5
  • Related CVEs
  • CVE-2026-23440: Linux Kernel Race Condition Vulnerability

  • CVE-2026-23434: Linux Kernel Race Condition Vulnerability

  • CVE-2026-23436: Linux Kernel Race Condition Vulnerability

  • CVE-2026-23463: Linux Kernel QBMAN Race Condition Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English