๐Ÿ” CVE Alert

CVE-2026-31596

UNKNOWN 0.0

ocfs2: handle invalid dinode in ocfs2_group_extend

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ocfs2: handle invalid dinode in ocfs2_group_extend [BUG] kernel BUG at fs/ocfs2/resize.c:308! Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI RIP: 0010:ocfs2_group_extend+0x10aa/0x1ae0 fs/ocfs2/resize.c:308 Code: 8b8520ff ffff83f8 860f8580 030000e8 5cc3c1fe Call Trace: ... ocfs2_ioctl+0x175/0x6e0 fs/ocfs2/ioctl.c:869 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:597 [inline] __se_sys_ioctl fs/ioctl.c:583 [inline] __x64_sys_ioctl+0x197/0x1e0 fs/ioctl.c:583 x64_sys_call+0x1144/0x26a0 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x93/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x76/0x7e ... [CAUSE] ocfs2_group_extend() assumes that the global bitmap inode block returned from ocfs2_inode_lock() has already been validated and BUG_ONs when the signature is not a dinode. That assumption is too strong for crafted filesystems because the JBD2-managed buffer path can bypass structural validation and return an invalid dinode to the resize ioctl. [FIX] Validate the dinode explicitly in ocfs2_group_extend(). If the global bitmap buffer does not contain a valid dinode, report filesystem corruption with ocfs2_error() and fail the resize operation instead of crashing the kernel.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 24, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 911b557dd7817460881fd51a03069b539c674d0e 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < e384a850a3370d89a7a446cdeccd964bfba2a302 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 10fb72c47aac446f12a4ccd962c7daa60cc890a1 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 41c6e9bc3a09539deab43957a3211d902a4818f0
Linux / Linux
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/911b557dd7817460881fd51a03069b539c674d0e git.kernel.org: https://git.kernel.org/stable/c/e384a850a3370d89a7a446cdeccd964bfba2a302 git.kernel.org: https://git.kernel.org/stable/c/10fb72c47aac446f12a4ccd962c7daa60cc890a1 git.kernel.org: https://git.kernel.org/stable/c/41c6e9bc3a09539deab43957a3211d902a4818f0