VYPR
High severity7.8NVD Advisory· Published Apr 22, 2026· Updated May 7, 2026

CVE-2026-31447

CVE-2026-31447

Description

In the Linux kernel, the following vulnerability has been resolved:

ext4: reject mount if bigalloc with s_first_data_block != 0

bigalloc with s_first_data_block != 0 is not supported, reject mounting it.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Linux kernel ext4: mounting a bigalloc filesystem with a non-zero first data block is now rejected as unsupported.

Vulnerability

CVE-2026-31447 is a vulnerability in the Linux kernel's ext4 filesystem driver. The ext4 driver previously allowed mounting a filesystem that uses the bigalloc feature while also having a non-zero s_first_data_block value. This combination is not supported by the ext4 implementation and could lead to undefined behavior or corruption.

Exploitation

An attacker with the ability to mount a crafted ext4 filesystem image (e.g., via a removable device or a malicious filesystem image) could trigger this unsupported configuration. No special privileges beyond mount access are required, but the attacker must be able to present a filesystem with the bigalloc feature flag set and a non-zero s_first_data_block.

Impact

Mounting such a filesystems with this unsupported combination could result in filesystem corruption, data loss, or potentially a system crash. The exact impact depends on the kernel's handling of the invalid state, but the vulnerability is rated High (CVSS 7.8) due to the potential for local privilege escalation or denial of service.

Mitigation

The fix, merged into the Linux kernel stable branches, adds a check during mount to reject any ext4 filesystem that has both the bigalloc feature and a non-zero s_first_data_block. Users should update their kernel to include the patch commit [1] or any of the subsequent stable backports [2][3][4]. No workaround exists other than avoiding the use of such crafted filesystems.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

8
  • Linux/Kernelinferred7 versions
    (expand)+ 6 more
    • (no CPE)
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=3.2,<5.10.253
    • cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.