Impact
In the Linux kernel, ext4_read_inline_folio previously triggered a BUG_ON when an inline data block exceeded PAGE_SIZE, causing the kernel to panic and making the system unavailable until rebooted. The patch replaces that unconditional panic with proper error handling, logging the corruption via ext4_error_inode(), releasing the buffer head to avoid a leak, and returning -EFSCORRUPTED so the filesystem can continue to operate while the corruption is reported. This change prevents an immediate system crash but still allows recovery of data integrity concerns. The vulnerability could have been leveraged to force denial of service without achieving code execution. The weakness stems from inadequate validation and error reporting in a critical filesystem routine.
Affected Systems
All Linux kernel builds before the patch are impacted, across all vendors that ship the standard open-source kernel. The specific version range is not enumerated, so any kernel that has not received the upstream change remains vulnerable. The issue resides in the ext4 filesystem component and therefore affects all systems that mount ext4 filesystems with the standard kernel release.
Risk and Exploitability
The CVSS score is not provided, and EPSS is unavailable, so exposure depth is uncertain but the lack of an active KEV listing suggests no widespread exploitation yet. An attacker would need to cause an inline data block to exceed PAGE_SIZE, which typically requires writing a very large inline file or manipulating filesystem metadata, a scenario that usually requires local privileges or compromised software. While exploitation does not grant code execution, it can still result in denial of service and filesystem corruption. Overall, the risk profile leans toward medium to high in environments where inline data growth can be unbounded, but the proprietary nature of the core vulnerability limits immediate exploitation avenues.
OpenCVE Enrichment