Impact
The Linux kernel contains a logic flaw that allows the allocation of indirect block files beyond the 32‑bit block number limit under certain conditions involving mixed extent‑mapped and indirect‑mapped files. This can lead to wraparound of block numbers, causing malformed metadata and potentially corrupting file system data. The vulnerability is a result of improper bounds checking in block allocation routines, which may compromise data integrity on affected systems.
Affected Systems
All Linux kernel versions that use ext4 prior to the inclusion of the safety clamp in ext4_mb_scan_groups(). The exact affected kernel releases are not listed, but any version with the flawed allocation logic is susceptible unless the patch has been applied.
Risk and Exploitability
The potential exploitation of this issue requires the ability to create or manipulate an ext4 file system that mixes extent‑mapped and indirect‑mapped objects. While no EPSS score is available and the vulnerability is not listed in CISA KEV, the logic flaw has the capacity to corrupt data and could be leveraged by an attacker with sufficient local access to the target system. The lack of publicly available exploitation evidence suggests a moderate to high risk for environments that cannot be updated promptly.
OpenCVE Enrichment