Home

Description

In the Linux kernel, the following vulnerability has been resolved: ext4: validate p_idx bounds in ext4_ext_correct_indexes ext4_ext_correct_indexes() walks up the extent tree correcting index entries when the first extent in a leaf is modified. Before accessing path[k].p_idx->ei_block, there is no validation that p_idx falls within the valid range of index entries for that level. If the on-disk extent header contains a corrupted or crafted eh_entries value, p_idx can point past the end of the allocated buffer, causing a slab-out-of-bounds read. Fix this by validating path[k].p_idx against EXT_LAST_INDEX() at both access sites: before the while loop and inside it. Return -EFSCORRUPTED if the index pointer is out of range, consistent with how other bounds violations are handled in the ext4 extent tree code.

PUBLISHED Reserved 2026-03-09 | Published 2026-04-22 | Updated 2026-04-27 | Assigner Linux




HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Product status

Default status
unaffected

a86c61812637c7dd0c57e29880cffd477b62f2e7 (git) before 407c944f217c17d4343148011acafebc604d55e1
affected

a86c61812637c7dd0c57e29880cffd477b62f2e7 (git) before 93f2e975ed658ce09db4d4c2877ca2c06540df83
affected

a86c61812637c7dd0c57e29880cffd477b62f2e7 (git) before 01bf1e0b997d82c0e353b51ed74ef99698043c33
affected

a86c61812637c7dd0c57e29880cffd477b62f2e7 (git) before 2acb5c12ebd860f30e4faf67e6cc8c44ddfe5fe8
affected

Default status
affected

2.6.19
affected

Any version before 2.6.19
unaffected

6.12.80 (semver)
unaffected

6.18.21 (semver)
unaffected

6.19.11 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/407c944f217c17d4343148011acafebc604d55e1

git.kernel.org/...c/93f2e975ed658ce09db4d4c2877ca2c06540df83

git.kernel.org/...c/01bf1e0b997d82c0e353b51ed74ef99698043c33

git.kernel.org/...c/2acb5c12ebd860f30e4faf67e6cc8c44ddfe5fe8

cve.org (CVE-2026-31449)

nvd.nist.gov (CVE-2026-31449)

Download JSON