CVE-2026-31451
ext4: replace BUG_ON with proper error handling in ext4_read_inline_folio
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: ext4: replace BUG_ON with proper error handling in ext4_read_inline_folio Replace BUG_ON() with proper error handling when inline data size exceeds PAGE_SIZE. This prevents kernel panic and allows the system to continue running while properly reporting the filesystem corruption. The error is logged via ext4_error_inode(), the buffer head is released to prevent memory leak, and -EFSCORRUPTED is returned to indicate filesystem corruption.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Apr 22, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 65c6c30ce6362c1c684568744ea510c921a756cd 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < d4b3f370c3d8f7ce565d4a718572c9f7c12f77ed 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 823849a26af089ffc5dfdd2ae4b9d446b46a0cda 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < a7d600e04732a7d29b107c91fe3aec64cf6ce7f2 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 356227096eb66e41b23caf7045e6304877322edf
Linux / Linux
All versions affected References
git.kernel.org: https://git.kernel.org/stable/c/65c6c30ce6362c1c684568744ea510c921a756cd git.kernel.org: https://git.kernel.org/stable/c/d4b3f370c3d8f7ce565d4a718572c9f7c12f77ed git.kernel.org: https://git.kernel.org/stable/c/823849a26af089ffc5dfdd2ae4b9d446b46a0cda git.kernel.org: https://git.kernel.org/stable/c/a7d600e04732a7d29b107c91fe3aec64cf6ce7f2 git.kernel.org: https://git.kernel.org/stable/c/356227096eb66e41b23caf7045e6304877322edf