CVE-2026-31716
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
01/05/2026
Last modified:
06/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
fs/ntfs3: validate rec->used in journal-replay file record check<br />
<br />
check_file_record() validates rec->total against the record size but<br />
never validates rec->used. The do_action() journal-replay handlers read<br />
rec->used from disk and use it to compute memmove lengths:<br />
<br />
DeleteAttribute: memmove(attr, ..., used - asize - roff)<br />
CreateAttribute: memmove(..., attr, used - roff)<br />
change_attr_size: memmove(..., used - PtrOffset(rec, next))<br />
<br />
When rec->used is smaller than the offset of a validated attribute, or<br />
larger than the record size, these subtractions can underflow allowing<br />
us to copy huge amounts of memory in to a 4kb buffer, generally<br />
considered a bad idea overall.<br />
<br />
This requires a corrupted filesystem, which isn&#39;t a threat model the<br />
kernel really needs to worry about, but checking for such an obvious<br />
out-of-bounds value is good to keep things robust, especially on journal<br />
replay<br />
<br />
Fix this up by bounding rec->used correctly.<br />
<br />
This is much like commit b2bc7c44ed17 ("fs/ntfs3: Fix slab-out-of-bounds<br />
read in DeleteIndexEntryRoot") which checked different values in this<br />
same switch statement.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15 (including) | 6.6.136 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.84 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.25 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 7.0.2 (excluding) |
| cpe:2.3:o:linux:linux_kernel:7.1:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0112e6279420d4005b3d57af36fb45c01b8d0116
- https://git.kernel.org/stable/c/0ca0485e4b2e837ebb6cbd4f2451aba665a03e4b
- https://git.kernel.org/stable/c/4b1613d7e2deda831a97e427d1ea586e50fe1be5
- https://git.kernel.org/stable/c/f79d0403ea20a81bc29105bba54fbcab54e8c403
- https://git.kernel.org/stable/c/f90b8a1798b750755a9e9aee66678f0a1820bbaf



