PT-2026-37385 · Linux · Linux

Published

2026-05-06

·

Updated

2026-05-06

·

CVE-2026-43075

None

No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
ocfs2: fix out-of-bounds write in ocfs2 write end inline
KASAN reports a use-after-free write of 4086 bytes in ocfs2 write end inline, called from ocfs2 write end nolock during a copy file range splice fallback on a corrupted ocfs2 filesystem mounted on a loop device. The actual bug is an out-of-bounds write past the inode block buffer, not a true use-after-free. The write overflows into an adjacent freed page, which KASAN reports as UAF.
The root cause is that ocfs2 try to write inline data trusts the on-disk id count field to determine whether a write fits in inline data. On a corrupted filesystem, id count can exceed the physical maximum inline data capacity, causing writes to overflow the inode block buffer.
Call trace (crash path):
vfs copy file range (fs/read write.c:1634) do splice direct splice direct to actor iter file splice write ocfs2 file write iter generic perform write ocfs2 write end ocfs2 write end nolock (fs/ocfs2/aops.c:1949) ocfs2 write end inline (fs/ocfs2/aops.c:1915) memcpy from folio <-- KASAN: write OOB
So add id count upper bound check in ocfs2 validate inode block() to alongside the existing i size check to fix it.

Related Identifiers

CVE-2026-43075

Affected Products

Linux