Description
In the Linux kernel, the following vulnerability has been resolved:

ext4: fix iloc.bh leak in ext4_fc_replay_inode() error paths

During code review, Joseph found that ext4_fc_replay_inode() calls
ext4_get_fc_inode_loc() to get the inode location, which holds a
reference to iloc.bh that must be released via brelse().

However, several error paths jump to the 'out' label without
releasing iloc.bh:

- ext4_handle_dirty_metadata() failure
- sync_dirty_buffer() failure
- ext4_mark_inode_used() failure
- ext4_iget() failure

Fix this by introducing an 'out_brelse' label placed just before
the existing 'out' label to ensure iloc.bh is always released.

Additionally, make ext4_fc_replay_inode() propagate errors
properly instead of always returning 0.
Published: 2026-05-05
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises from a missing buffer-head release in the ext4 file system’s replay routine. When ext4_fc_replay_inode() encounters certain error paths, it jumps to an out label that leaves the iloc.bh reference unreleased, leading to a cumulative kernel memory leak. Because the function also incorrectly reports success instead of propagating errors, the system may continue performing operations while the leak progresses. Over time, this unchecked consumption can exhaust kernel memory pools, trigger the OOM killer, or destabilize the system, presenting a denial‑of‑service risk.

Affected Systems

All installations of the Linux kernel that implement the ext4 file system and have not incorporated the commit that adds the out_brelse label are vulnerable. The fix is contained in commit 0892f12cd49fde5d5db68137923db107f894f3a3, and any kernel build preceding that commit is considered at risk.

Risk and Exploitability

The advisory does not publish a CVSS or EPSS score, and the issue is not listed in the CISA KEV catalog. Based on the description, exploitation would involve inducing one of the ext4 error paths (such as a metadata handling failure) to trigger the leak. This typically requires local interaction with the filesystem, though an attacker could leverage an auxiliary vulnerability to gain such access. If the error paths are repeatedly activated, kernel memory exhaustion could ensue, potentially causing a system‑wide outage.

Generated by OpenCVE AI on May 5, 2026 at 18:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Linux kernel patch that releases the iloc.bh reference and corrects error propagation, or upgrade to a kernel release that includes commit 0892f12cd49fde5d5db68137923db107f894f3a3.
  • Restrict write access to ext4 partitions for untrusted or unprivileged users to reduce the likelihood that error paths are triggered.
  • Continuously monitor system memory usage and OOM killer logs; investigate and remediate any pattern of repeated ext4 metadata errors that could indicate exploitation attempts.

Generated by OpenCVE AI on May 5, 2026 at 18:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 05 May 2026 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-791

Tue, 05 May 2026 16:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: ext4: fix iloc.bh leak in ext4_fc_replay_inode() error paths During code review, Joseph found that ext4_fc_replay_inode() calls ext4_get_fc_inode_loc() to get the inode location, which holds a reference to iloc.bh that must be released via brelse(). However, several error paths jump to the 'out' label without releasing iloc.bh: - ext4_handle_dirty_metadata() failure - sync_dirty_buffer() failure - ext4_mark_inode_used() failure - ext4_iget() failure Fix this by introducing an 'out_brelse' label placed just before the existing 'out' label to ensure iloc.bh is always released. Additionally, make ext4_fc_replay_inode() propagate errors properly instead of always returning 0.
Title ext4: fix iloc.bh leak in ext4_fc_replay_inode() error paths
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-05T15:23:25.984Z

Reserved: 2026-05-01T14:12:55.981Z

Link: CVE-2026-43066

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-05T16:16:15.810

Modified: 2026-05-05T16:16:15.810

Link: CVE-2026-43066

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-05T19:00:12Z

Weaknesses