CVE-2026-31716
Gravedad CVSS v3.1:
ALTA
Tipo:
CWE-787
Escritura fuera de límites
Fecha de publicación:
01/05/2026
Última modificación:
06/05/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
fs/ntfs3: validate rec->used in journal-replay file record check<br />
<br />
check_file_record() validates rec->total against the record size but<br />
never validates rec->used. The do_action() journal-replay handlers read<br />
rec->used from disk and use it to compute memmove lengths:<br />
<br />
DeleteAttribute: memmove(attr, ..., used - asize - roff)<br />
CreateAttribute: memmove(..., attr, used - roff)<br />
change_attr_size: memmove(..., used - PtrOffset(rec, next))<br />
<br />
When rec->used is smaller than the offset of a validated attribute, or<br />
larger than the record size, these subtractions can underflow allowing<br />
us to copy huge amounts of memory in to a 4kb buffer, generally<br />
considered a bad idea overall.<br />
<br />
This requires a corrupted filesystem, which isn&#39;t a threat model the<br />
kernel really needs to worry about, but checking for such an obvious<br />
out-of-bounds value is good to keep things robust, especially on journal<br />
replay<br />
<br />
Fix this up by bounding rec->used correctly.<br />
<br />
This is much like commit b2bc7c44ed17 ("fs/ntfs3: Fix slab-out-of-bounds<br />
read in DeleteIndexEntryRoot") which checked different values in this<br />
same switch statement.
Impacto
Puntuación base 3.x
7.80
Gravedad 3.x
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15 (incluyendo) | 6.6.136 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (incluyendo) | 6.12.84 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (incluyendo) | 6.18.25 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (incluyendo) | 7.0.2 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:7.1:rc1:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/0112e6279420d4005b3d57af36fb45c01b8d0116
- https://git.kernel.org/stable/c/0ca0485e4b2e837ebb6cbd4f2451aba665a03e4b
- https://git.kernel.org/stable/c/4b1613d7e2deda831a97e427d1ea586e50fe1be5
- https://git.kernel.org/stable/c/f79d0403ea20a81bc29105bba54fbcab54e8c403
- https://git.kernel.org/stable/c/f90b8a1798b750755a9e9aee66678f0a1820bbaf



