CVE-2026-43068 PUBLISHED

ext4: avoid allocate block from corrupted group in ext4_mb_find_by_goal()

Assigner: Linux
Reserved: 01.05.2026 Published: 05.05.2026 Updated: 05.05.2026

In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid allocate block from corrupted group in ext4_mb_find_by_goal()

There's issue as follows: ... EXT4-fs (mmcblk0p1): Delayed block allocation failed for inode 206 at logical offset 0 with max blocks 1 with error 117 EXT4-fs (mmcblk0p1): This should not happen!! Data will be lost

EXT4-fs (mmcblk0p1): Delayed block allocation failed for inode 206 at logical offset 0 with max blocks 1 with error 117 EXT4-fs (mmcblk0p1): This should not happen!! Data will be lost

EXT4-fs (mmcblk0p1): Delayed block allocation failed for inode 206 at logical offset 0 with max blocks 1 with error 117 EXT4-fs (mmcblk0p1): This should not happen!! Data will be lost

EXT4-fs (mmcblk0p1): Delayed block allocation failed for inode 206 at logical offset 0 with max blocks 1 with error 117 EXT4-fs (mmcblk0p1): This should not happen!! Data will be lost

EXT4-fs (mmcblk0p1): Delayed block allocation failed for inode 2243 at logical offset 0 with max blocks 1 with error 117 EXT4-fs (mmcblk0p1): This should not happen!! Data will be lost

EXT4-fs (mmcblk0p1): Delayed block allocation failed for inode 2239 at logical offset 0 with max blocks 1 with error 117 EXT4-fs (mmcblk0p1): This should not happen!! Data will be lost

EXT4-fs (mmcblk0p1): error count since last fsck: 1 EXT4-fs (mmcblk0p1): initial error at time 1765597433: ext4_mb_generate_buddy:760 EXT4-fs (mmcblk0p1): last error at time 1765597433: ext4_mb_generate_buddy:760 ...

According to the log analysis, blocks are always requested from the corrupted block group. This may happen as follows: ext4_mb_find_by_goal ext4_mb_load_buddy ext4_mb_load_buddy_gfp ext4_mb_init_cache ext4_read_block_bitmap_nowait ext4_wait_block_bitmap ext4_validate_block_bitmap if (!grp || EXT4_MB_GRP_BBITMAP_CORRUPT(grp)) return -EFSCORRUPTED; // There's no logs. if (err) return err; // Will return error ext4_lock_group(ac->ac_sb, group); if (unlikely(EXT4_MB_GRP_BBITMAP_CORRUPT(e4b->bd_info))) // Unreachable goto out;

After commit 9008a58e5dce ("ext4: make the bitmap read routines return real error codes") merged, Commit 163a203ddb36 ("ext4: mark block group as corrupt on block bitmap error") is no real solution for allocating blocks from corrupted block groups. This is because if 'EXT4_MB_GRP_BBITMAP_CORRUPT(e4b->bd_info)' is true, then 'ext4_mb_load_buddy()' may return an error. This means that the block allocation will fail. Therefore, check block group if corrupted when ext4_mb_load_buddy() returns error.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 163a203ddb36c36d4a1c942aececda0cc8d06aa7 to fea6b2e250ff48f10d166011b57a8516ae5438c9 (excl.)
  • affected from 163a203ddb36c36d4a1c942aececda0cc8d06aa7 to 0b84571c886719823d537f05f4f07cad6357c4b7 (excl.)
  • affected from 163a203ddb36c36d4a1c942aececda0cc8d06aa7 to ffc0a282462d45fee5957621be5afa29752f3b6d (excl.)
  • affected from 163a203ddb36c36d4a1c942aececda0cc8d06aa7 to 2d31a5073f86a177edf44015e0dedb0c47cfd6d8 (excl.)
  • affected from 163a203ddb36c36d4a1c942aececda0cc8d06aa7 to 9370207b36d26e45a8c8ef0500706d37036edd6b (excl.)
  • affected from 163a203ddb36c36d4a1c942aececda0cc8d06aa7 to 1895f7904be71c48f1e6f338b28f24dabd6b8aeb (excl.)
  • affected from 163a203ddb36c36d4a1c942aececda0cc8d06aa7 to 1c0d7c4cde38a887c6d74e0c89ddb25226943c78 (excl.)
  • affected from 163a203ddb36c36d4a1c942aececda0cc8d06aa7 to 46066e3a06647c5b186cc6334409722622d05c44 (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 3.12 is affected
  • unaffected from 0 to 3.12 (excl.)
  • unaffected from 5.10.253 to 5.10.* (incl.)
  • unaffected from 5.15.203 to 5.15.* (incl.)
  • unaffected from 6.1.168 to 6.1.* (incl.)
  • unaffected from 6.6.131 to 6.6.* (incl.)
  • unaffected from 6.12.80 to 6.12.* (incl.)
  • unaffected from 6.18.21 to 6.18.* (incl.)
  • unaffected from 6.19.11 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References