CVE-2026-31448
Infinite Loop Vulnerability in Linux ext4 Causing mkdir Hang
Publication date: 2026-04-22
Last updated on: 2026-04-27
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's ext4 file system. It occurs during the mkdir or mknod operations when mapping logical blocks to physical blocks. If inserting a new extent into the extent tree fails, the system frees the physical block but does not delete the corresponding data in the extent tree. This causes subsequent mkdir operations to reference the same physical block that is already in use by the extended attribute (xattr) block, leading to both directory and xattr using the same memory buffer simultaneously.
As a result, the ext4_xattr_block_set() function can enter an infinite loop and fail to release the inode lock, causing a blocking problem where the task is stuck for an extended period (e.g., 143 seconds). Additionally, if metadata is corrupted, attempts to remove extent space can cause further damage, including incorrect quota updates.
How can this vulnerability impact me? :
This vulnerability can cause the system to enter an infinite loop during certain file system operations, leading to tasks being blocked for long periods (such as 143 seconds). This blocking can degrade system performance and responsiveness.
Moreover, if the file system metadata is corrupted, attempts to free space may cause further damage, including incorrect quota information updates, which could affect disk usage accounting and stability.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability involves infinite loops caused by residual data in the ext4 filesystem when inserting new extents fails. Immediate mitigation should focus on avoiding operations that trigger this condition, such as mkdir or mknod operations on affected ext4 filesystems.
Since the issue arises from improper handling of extent tree updates and block freeing, applying the patch or update that resolves this issue in the Linux kernel is the recommended step.
Avoid filesystem operations that modify extents on ext4 until the fix is applied to prevent inode lock blocking and infinite loops.