Home

Description

In the Linux kernel, the following vulnerability has been resolved: ocfs2: handle invalid dinode in ocfs2_group_extend [BUG] kernel BUG at fs/ocfs2/resize.c:308! Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI RIP: 0010:ocfs2_group_extend+0x10aa/0x1ae0 fs/ocfs2/resize.c:308 Code: 8b8520ff ffff83f8 860f8580 030000e8 5cc3c1fe Call Trace: ... ocfs2_ioctl+0x175/0x6e0 fs/ocfs2/ioctl.c:869 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:597 [inline] __se_sys_ioctl fs/ioctl.c:583 [inline] __x64_sys_ioctl+0x197/0x1e0 fs/ioctl.c:583 x64_sys_call+0x1144/0x26a0 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x93/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x76/0x7e ... [CAUSE] ocfs2_group_extend() assumes that the global bitmap inode block returned from ocfs2_inode_lock() has already been validated and BUG_ONs when the signature is not a dinode. That assumption is too strong for crafted filesystems because the JBD2-managed buffer path can bypass structural validation and return an invalid dinode to the resize ioctl. [FIX] Validate the dinode explicitly in ocfs2_group_extend(). If the global bitmap buffer does not contain a valid dinode, report filesystem corruption with ocfs2_error() and fail the resize operation instead of crashing the kernel.

PUBLISHED Reserved 2026-03-09 | Published 2026-04-24 | Updated 2026-04-27 | Assigner Linux

Product status

Default status
unaffected

10995aa2451afa20b721cc7de856cae1a13dba57 (git) before 6575f9fbf084502b7118a628425bf7866666498d
affected

10995aa2451afa20b721cc7de856cae1a13dba57 (git) before 911b557dd7817460881fd51a03069b539c674d0e
affected

10995aa2451afa20b721cc7de856cae1a13dba57 (git) before e384a850a3370d89a7a446cdeccd964bfba2a302
affected

10995aa2451afa20b721cc7de856cae1a13dba57 (git) before 10fb72c47aac446f12a4ccd962c7daa60cc890a1
affected

10995aa2451afa20b721cc7de856cae1a13dba57 (git) before 41c6e9bc3a09539deab43957a3211d902a4818f0
affected

10995aa2451afa20b721cc7de856cae1a13dba57 (git) before 4a1c0ddc6e7bcf2e9db0eeaab9340dcfe97f448f
affected

Default status
affected

2.6.29
affected

Any version before 2.6.29
unaffected

6.6.136 (semver)
unaffected

6.12.83 (semver)
unaffected

6.18.24 (semver)
unaffected

6.19.14 (semver)
unaffected

7.0.1 (semver)
unaffected

7.1-rc1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/6575f9fbf084502b7118a628425bf7866666498d

git.kernel.org/...c/911b557dd7817460881fd51a03069b539c674d0e

git.kernel.org/...c/e384a850a3370d89a7a446cdeccd964bfba2a302

git.kernel.org/...c/10fb72c47aac446f12a4ccd962c7daa60cc890a1

git.kernel.org/...c/41c6e9bc3a09539deab43957a3211d902a4818f0

git.kernel.org/...c/4a1c0ddc6e7bcf2e9db0eeaab9340dcfe97f448f

cve.org (CVE-2026-31596)

nvd.nist.gov (CVE-2026-31596)

Download JSON