CVE-2026-31451 PUBLISHED

ext4: replace BUG_ON with proper error handling in ext4_read_inline_folio

Assigner: Linux
Reserved: 09.03.2026 Published: 22.04.2026 Updated: 22.04.2026

In the Linux kernel, the following vulnerability has been resolved:

ext4: replace BUG_ON with proper error handling in ext4_read_inline_folio

Replace BUG_ON() with proper error handling when inline data size exceeds PAGE_SIZE. This prevents kernel panic and allows the system to continue running while properly reporting the filesystem corruption.

The error is logged via ext4_error_inode(), the buffer head is released to prevent memory leak, and -EFSCORRUPTED is returned to indicate filesystem corruption.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 65c6c30ce6362c1c684568744ea510c921a756cd (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to d4b3f370c3d8f7ce565d4a718572c9f7c12f77ed (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 823849a26af089ffc5dfdd2ae4b9d446b46a0cda (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to a7d600e04732a7d29b107c91fe3aec64cf6ce7f2 (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 356227096eb66e41b23caf7045e6304877322edf (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • unaffected from 6.6.131 to 6.6.* (incl.)
  • unaffected from 6.12.80 to 6.12.* (incl.)
  • unaffected from 6.18.21 to 6.18.* (incl.)
  • unaffected from 6.19.11 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References