PT-2026-37385 · Linux · Linux
Published
2026-05-06
·
Updated
2026-05-06
·
CVE-2026-43075
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
ocfs2: fix out-of-bounds write in ocfs2 write end inline
KASAN reports a use-after-free write of 4086 bytes in
ocfs2 write end inline, called from ocfs2 write end nolock during a
copy file range splice fallback on a corrupted ocfs2 filesystem mounted on
a loop device. The actual bug is an out-of-bounds write past the inode
block buffer, not a true use-after-free. The write overflows into an
adjacent freed page, which KASAN reports as UAF.
The root cause is that ocfs2 try to write inline data trusts the on-disk
id count field to determine whether a write fits in inline data. On a
corrupted filesystem, id count can exceed the physical maximum inline data
capacity, causing writes to overflow the inode block buffer.
Call trace (crash path):
vfs copy file range (fs/read write.c:1634)
do splice direct
splice direct to actor
iter file splice write
ocfs2 file write iter
generic perform write
ocfs2 write end
ocfs2 write end nolock (fs/ocfs2/aops.c:1949)
ocfs2 write end inline (fs/ocfs2/aops.c:1915)
memcpy from folio <-- KASAN: write OOB
So add id count upper bound check in ocfs2 validate inode block() to
alongside the existing i size check to fix it.
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux