CVE-2026-31447
Description
In the Linux kernel, the following vulnerability has been resolved:
ext4: reject mount if bigalloc with s_first_data_block != 0
bigalloc with s_first_data_block != 0 is not supported, reject mounting it.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Linux kernel ext4: mounting a bigalloc filesystem with a non-zero first data block is now rejected as unsupported.
Vulnerability
CVE-2026-31447 is a vulnerability in the Linux kernel's ext4 filesystem driver. The ext4 driver previously allowed mounting a filesystem that uses the bigalloc feature while also having a non-zero s_first_data_block value. This combination is not supported by the ext4 implementation and could lead to undefined behavior or corruption.
Exploitation
An attacker with the ability to mount a crafted ext4 filesystem image (e.g., via a removable device or a malicious filesystem image) could trigger this unsupported configuration. No special privileges beyond mount access are required, but the attacker must be able to present a filesystem with the bigalloc feature flag set and a non-zero s_first_data_block.
Impact
Mounting such a filesystems with this unsupported combination could result in filesystem corruption, data loss, or potentially a system crash. The exact impact depends on the kernel's handling of the invalid state, but the vulnerability is rated High (CVSS 7.8) due to the potential for local privilege escalation or denial of service.
Mitigation
The fix, merged into the Linux kernel stable branches, adds a check during mount to reject any ext4 filesystem that has both the bigalloc feature and a non-zero s_first_data_block. Users should update their kernel to include the patch commit [1] or any of the subsequent stable backports [2][3][4]. No workaround exists other than avoiding the use of such crafted filesystems.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
8(expand)+ 6 more
- (no CPE)
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=3.2,<5.10.253
- cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- git.kernel.org/stable/c/3822743dc20386d9897e999dbb990befa3a5b3f8nvdPatch
- git.kernel.org/stable/c/3a926957cc95899ef88529710836edadc03c71a1nvdPatch
- git.kernel.org/stable/c/5ad6d994255e27a3254079dfb50ca861fc31f2d0nvdPatch
- git.kernel.org/stable/c/7b58c110b4e1f028eb38eec9ed3555e9be81c8b0nvdPatch
- git.kernel.org/stable/c/7d5b04290156c3fc316eecc86a4f9d201ab7d44anvdPatch
- git.kernel.org/stable/c/ad1f6d608f33f59d21a3d025615d6786a6443998nvdPatch
- git.kernel.org/stable/c/b77de3fceafbb39f30e4ff5dc986f863d5456417nvdPatch
- git.kernel.org/stable/c/d787d3ae96648dc14a3b7ca8fde817177e82c1c7nvdPatch
News mentions
0No linked articles in our index yet.