CVE-2026-43068
Buffer Overflow in Linux Kernel ext4 Filesystem
Publication date: 2026-05-05
Last updated on: 2026-05-05
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's ext4 filesystem, specifically in the block allocation process. The issue occurs when the system tries to allocate blocks from a corrupted block group in the ext4_mb_find_by_goal() function. Due to improper handling of corrupted block groups, the filesystem may attempt to allocate blocks from these corrupted groups, leading to delayed block allocation failures and data loss.
The problem arises because the code does not properly check for corrupted block groups after ext4_mb_load_buddy() returns an error, allowing block allocation to fail and causing filesystem errors.
How can this vulnerability impact me? :
This vulnerability can lead to data loss due to failed block allocations in the ext4 filesystem. When the filesystem tries to allocate blocks from corrupted block groups, it results in errors such as 'Delayed block allocation failed' and messages indicating that data will be lost.
Such failures can cause filesystem instability, potential corruption, and loss of important data stored on affected partitions.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring system logs for specific EXT4 filesystem error messages indicating delayed block allocation failures and corrupted block groups.
- Look for log entries similar to: "EXT4-fs (mmcblk0p1): Delayed block allocation failed for inode ... with error 117" and "EXT4-fs (mmcblk0p1): This should not happen!! Data will be lost".
- Check for error counts and timestamps in EXT4-fs logs, such as "error count since last fsck" and errors related to "ext4_mb_generate_buddy".
Commands to help detect these issues include checking the kernel logs with:
- dmesg | grep EXT4-fs
- journalctl -k | grep EXT4-fs
- grep EXT4-fs /var/log/syslog
Additionally, running filesystem checks (fsck) on the affected partitions may reveal corrupted block groups.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves preventing data loss caused by corrupted block groups in the EXT4 filesystem.
- Run a filesystem check (fsck) on the affected EXT4 partitions to detect and repair corrupted block groups.
- Avoid using the affected block groups by ensuring the filesystem is repaired and healthy before further use.
- Update the Linux kernel to a version that includes the fix for this vulnerability, which avoids allocating blocks from corrupted groups.
Regularly monitor system logs for EXT4 errors to detect any recurrence early.