VYPR
High severity7.8NVD Advisory· Published Apr 22, 2026· Updated May 7, 2026

CVE-2026-31449

CVE-2026-31449

Description

In the Linux kernel, the following vulnerability has been resolved:

ext4: validate p_idx bounds in ext4_ext_correct_indexes

ext4_ext_correct_indexes() walks up the extent tree correcting index entries when the first extent in a leaf is modified. Before accessing path[k].p_idx->ei_block, there is no validation that p_idx falls within the valid range of index entries for that level.

If the on-disk extent header contains a corrupted or crafted eh_entries value, p_idx can point past the end of the allocated buffer, causing a slab-out-of-bounds read.

Fix this by validating path[k].p_idx against EXT_LAST_INDEX() at both access sites: before the while loop and inside it. Return -EFSCORRUPTED if the index pointer is out of range, consistent with how other bounds violations are handled in the ext4 extent tree code.

Affected products

13
  • Torvalds/Linuxinferred
  • Linux/Kernel12 versions
    cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 11 more
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=2.6.19.1,<6.12.80
    • cpe:2.3:o:linux:linux_kernel:2.6.19:-:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:2.6.19:rc5:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:2.6.19:rc6:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

News mentions

0

No linked articles in our index yet.