CVE-2026-31596
Gravedad CVSS v3.1:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
24/04/2026
Última modificación:
29/04/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ocfs2: handle invalid dinode in ocfs2_group_extend<br />
<br />
[BUG]<br />
kernel BUG at fs/ocfs2/resize.c:308!<br />
Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI<br />
RIP: 0010:ocfs2_group_extend+0x10aa/0x1ae0 fs/ocfs2/resize.c:308<br />
Code: 8b8520ff ffff83f8 860f8580 030000e8 5cc3c1fe<br />
Call Trace:<br />
...<br />
ocfs2_ioctl+0x175/0x6e0 fs/ocfs2/ioctl.c:869<br />
vfs_ioctl fs/ioctl.c:51 [inline]<br />
__do_sys_ioctl fs/ioctl.c:597 [inline]<br />
__se_sys_ioctl fs/ioctl.c:583 [inline]<br />
__x64_sys_ioctl+0x197/0x1e0 fs/ioctl.c:583<br />
x64_sys_call+0x1144/0x26a0 arch/x86/include/generated/asm/syscalls_64.h:17<br />
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]<br />
do_syscall_64+0x93/0xf80 arch/x86/entry/syscall_64.c:94<br />
entry_SYSCALL_64_after_hwframe+0x76/0x7e<br />
...<br />
<br />
[CAUSE]<br />
ocfs2_group_extend() assumes that the global bitmap inode block<br />
returned from ocfs2_inode_lock() has already been validated and<br />
BUG_ONs when the signature is not a dinode. That assumption is too<br />
strong for crafted filesystems because the JBD2-managed buffer path<br />
can bypass structural validation and return an invalid dinode to the<br />
resize ioctl.<br />
<br />
[FIX]<br />
Validate the dinode explicitly in ocfs2_group_extend(). If the global<br />
bitmap buffer does not contain a valid dinode, report filesystem<br />
corruption with ocfs2_error() and fail the resize operation instead of<br />
crashing the kernel.
Impacto
Puntuación base 3.x
5.50
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.29 (incluyendo) | 6.6.136 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (incluyendo) | 6.12.83 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (incluyendo) | 6.18.24 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (incluyendo) | 6.19.14 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 7.0 (incluyendo) | 7.0.1 (excluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/10fb72c47aac446f12a4ccd962c7daa60cc890a1
- https://git.kernel.org/stable/c/41c6e9bc3a09539deab43957a3211d902a4818f0
- https://git.kernel.org/stable/c/4a1c0ddc6e7bcf2e9db0eeaab9340dcfe97f448f
- https://git.kernel.org/stable/c/6575f9fbf084502b7118a628425bf7866666498d
- https://git.kernel.org/stable/c/911b557dd7817460881fd51a03069b539c674d0e
- https://git.kernel.org/stable/c/e384a850a3370d89a7a446cdeccd964bfba2a302



