Description
In the Linux kernel, the following vulnerability has been resolved:

ext4: replace BUG_ON with proper error handling in ext4_read_inline_folio

Replace BUG_ON() with proper error handling when inline data size
exceeds PAGE_SIZE. This prevents kernel panic and allows the system to
continue running while properly reporting the filesystem corruption.

The error is logged via ext4_error_inode(), the buffer head is released
to prevent memory leak, and -EFSCORRUPTED is returned to indicate
filesystem corruption.
Published: 2026-04-22
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

In the Linux kernel, ext4_read_inline_folio previously triggered a BUG_ON when an inline data block exceeded PAGE_SIZE, causing the kernel to panic and making the system unavailable until rebooted. The patch replaces that unconditional panic with proper error handling, logging the corruption via ext4_error_inode(), releasing the buffer head to avoid a leak, and returning -EFSCORRUPTED so the filesystem can continue to operate while the corruption is reported. This change prevents an immediate system crash but still allows recovery of data integrity concerns. The vulnerability could have been leveraged to force denial of service without achieving code execution. The weakness stems from inadequate validation and error reporting in a critical filesystem routine.

Affected Systems

All Linux kernel builds before the patch are impacted, across all vendors that ship the standard open-source kernel. The specific version range is not enumerated, so any kernel that has not received the upstream change remains vulnerable. The issue resides in the ext4 filesystem component and therefore affects all systems that mount ext4 filesystems with the standard kernel release.

Risk and Exploitability

The CVSS score is not provided, and EPSS is unavailable, so exposure depth is uncertain but the lack of an active KEV listing suggests no widespread exploitation yet. An attacker would need to cause an inline data block to exceed PAGE_SIZE, which typically requires writing a very large inline file or manipulating filesystem metadata, a scenario that usually requires local privileges or compromised software. While exploitation does not grant code execution, it can still result in denial of service and filesystem corruption. Overall, the risk profile leans toward medium to high in environments where inline data growth can be unbounded, but the proprietary nature of the core vulnerability limits immediate exploitation avenues.

Generated by OpenCVE AI on April 22, 2026 at 19:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest kernel patch that addresses the ext4_read_inline_folio bug.
  • If an immediate kernel update is not possible, obtain the backported patch from the vendor and apply it manually.
  • After applying the fix, perform a full filesystem integrity check using fsck or similar tools to detect and repair any existing corruption.
  • Audit application and system behavior to prevent generating inline data blocks that could exceed page size, potentially by limiting inline file sizes or disabling inline data features where appropriate.

Generated by OpenCVE AI on April 22, 2026 at 19:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1284
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Wed, 22 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-400
CWE-479

Wed, 22 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: ext4: replace BUG_ON with proper error handling in ext4_read_inline_folio Replace BUG_ON() with proper error handling when inline data size exceeds PAGE_SIZE. This prevents kernel panic and allows the system to continue running while properly reporting the filesystem corruption. The error is logged via ext4_error_inode(), the buffer head is released to prevent memory leak, and -EFSCORRUPTED is returned to indicate filesystem corruption.
Title ext4: replace BUG_ON with proper error handling in ext4_read_inline_folio
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-23T15:18:28.679Z

Reserved: 2026-03-09T15:48:24.091Z

Link: CVE-2026-31451

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-22T14:16:39.310

Modified: 2026-04-23T16:17:41.280

Link: CVE-2026-31451

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-22T00:00:00Z

Links: CVE-2026-31451 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T19:15:24Z

Weaknesses