PT-2026-34357 · Linux · Linux Kernel
Published
2026-04-22
·
Updated
2026-04-22
·
CVE-2026-31452
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
Name of the Vulnerable Software and Affected Versions
Linux kernel (affected versions not specified)
Description
An issue exists in the ext4 filesystem where the system fails to convert files from inline data storage to extent-based storage when a truncate operation increases the file size beyond the inline capacity. This leads to an inconsistent state where the inline data flag remains set despite the file size exceeding the available inline space. Consequently, when a function like
sendfile() attempts to write data, the ext4 write inline data() function triggers a kernel BUG ON() because the write size exceeds the inline capacity, which is typically limited to approximately 60 bytes for i block and 96 bytes for xattrs.Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux Kernel