CVE-2026-43067
Buffer Overflow in Linux Kernel ext4 Filesystem
Publication date: 2026-05-05
Last updated on: 2026-05-05
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | to 416baaa9-dc9f-4396-8d5f-8c081fb06d67 (inc) |
| linux | linux_kernel | to 416baaa9-dc9f-4396-8d5f-8c081fb06d67 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
The vulnerability could lead to improper block allocation beyond the intended 32-bit block number limit in ext4 filesystems. This might cause filesystem corruption or data integrity issues, especially in mixed mapping scenarios where some files use extent mapping and others use indirect block mapping. Such corruption could result in data loss or system instability.
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's ext4 filesystem. It relates to how the system allocates blocks for files that use indirect block mapping. A recent commit aimed to restrict block allocation to 32-bit block numbers to prevent wraparound issues. However, a review identified a scenario where the allocation process might still select unsupported block groups, potentially allowing allocation beyond the 32-bit limit. This can occur in filesystems where some files or directories use extent mapping while others use indirect block mapping. The issue was addressed by adding a safety clamp in the block group scanning function to prevent this improper allocation.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved by adding a safety clamp in the ext4_mb_scan_groups() function to prevent allocation of blocks beyond the 32-bit limit for indirect block mapped files.
To mitigate this vulnerability, you should update your Linux kernel to a version that includes the fix from commit 4865c768b563 or later.