CVE-2026-31514 (GCVE-0-2026-31514)

Vulnerability from cvelistv5 – Published: 2026-04-22 13:54 – Updated: 2026-05-11 22:10
VLAI?
Title
erofs: set fileio bio failed in short read case
Summary
In the Linux kernel, the following vulnerability has been resolved: erofs: set fileio bio failed in short read case For file-backed mount, IO requests are handled by vfs_iocb_iter_read(). However, it can be interrupted by SIGKILL, returning the number of bytes actually copied. Unused folios in bio are unexpectedly marked as uptodate. vfs_read filemap_read filemap_get_pages filemap_readahead erofs_fileio_readahead erofs_fileio_rq_submit vfs_iocb_iter_read filemap_read filemap_get_pages <= detect signal erofs_fileio_ki_complete <= set all folios uptodate This patch addresses this by setting short read bio with an error directly.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: 8d582d65d20bb4796db01b19e86909ad68cb337b , < d1ba7d6b3cd1757b108d7b6856c92ae661d6c323 (git)
Affected: e49abde0ffc382a967b24f326d1614ac3bb06a94 , < 5cf3972c8221abdb1b464a14ccf8103d840b9085 (git)
Affected: fe4039034dcdf584afbf763787909e28e92a4927 , < 5a5f23ef5431639db1ac3a0b274aef3a84cc413c (git)
Affected: bc804a8d7e865ef47fb7edcaf5e77d18bf444ebc , < eade54040384f54b7fb330e4b0975c5734850b3c (git)
Create a notification for this product.
Linux Linux Affected: 6.12.75 , < 6.12.80 (semver)
Affected: 6.18.14 , < 6.18.21 (semver)
Affected: 6.19.4 , < 6.19.11 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "fs/erofs/fileio.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "d1ba7d6b3cd1757b108d7b6856c92ae661d6c323",
              "status": "affected",
              "version": "8d582d65d20bb4796db01b19e86909ad68cb337b",
              "versionType": "git"
            },
            {
              "lessThan": "5cf3972c8221abdb1b464a14ccf8103d840b9085",
              "status": "affected",
              "version": "e49abde0ffc382a967b24f326d1614ac3bb06a94",
              "versionType": "git"
            },
            {
              "lessThan": "5a5f23ef5431639db1ac3a0b274aef3a84cc413c",
              "status": "affected",
              "version": "fe4039034dcdf584afbf763787909e28e92a4927",
              "versionType": "git"
            },
            {
              "lessThan": "eade54040384f54b7fb330e4b0975c5734850b3c",
              "status": "affected",
              "version": "bc804a8d7e865ef47fb7edcaf5e77d18bf444ebc",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "fs/erofs/fileio.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "6.12.80",
              "status": "affected",
              "version": "6.12.75",
              "versionType": "semver"
            },
            {
              "lessThan": "6.18.21",
              "status": "affected",
              "version": "6.18.14",
              "versionType": "semver"
            },
            {
              "lessThan": "6.19.11",
              "status": "affected",
              "version": "6.19.4",
              "versionType": "semver"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.80",
                  "versionStartIncluding": "6.12.75",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.18.21",
                  "versionStartIncluding": "6.18.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.19.11",
                  "versionStartIncluding": "6.19.4",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nerofs: set fileio bio failed in short read case\n\nFor file-backed mount, IO requests are handled by vfs_iocb_iter_read().\nHowever, it can be interrupted by SIGKILL, returning the number of\nbytes actually copied. Unused folios in bio are unexpectedly marked\nas uptodate.\n\n  vfs_read\n    filemap_read\n      filemap_get_pages\n        filemap_readahead\n          erofs_fileio_readahead\n            erofs_fileio_rq_submit\n              vfs_iocb_iter_read\n                filemap_read\n                  filemap_get_pages  \u003c= detect signal\n              erofs_fileio_ki_complete  \u003c= set all folios uptodate\n\nThis patch addresses this by setting short read bio with an error\ndirectly."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-11T22:10:16.061Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/d1ba7d6b3cd1757b108d7b6856c92ae661d6c323"
        },
        {
          "url": "https://git.kernel.org/stable/c/5cf3972c8221abdb1b464a14ccf8103d840b9085"
        },
        {
          "url": "https://git.kernel.org/stable/c/5a5f23ef5431639db1ac3a0b274aef3a84cc413c"
        },
        {
          "url": "https://git.kernel.org/stable/c/eade54040384f54b7fb330e4b0975c5734850b3c"
        }
      ],
      "title": "erofs: set fileio bio failed in short read case",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2026-31514",
    "datePublished": "2026-04-22T13:54:31.531Z",
    "dateReserved": "2026-03-09T15:48:24.107Z",
    "dateUpdated": "2026-05-11T22:10:16.061Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2026-31514",
      "date": "2026-05-23",
      "epss": "0.00013",
      "percentile": "0.02182"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2026-31514\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-04-22T14:16:50.810\",\"lastModified\":\"2026-04-28T16:19:39.717\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nerofs: set fileio bio failed in short read case\\n\\nFor file-backed mount, IO requests are handled by vfs_iocb_iter_read().\\nHowever, it can be interrupted by SIGKILL, returning the number of\\nbytes actually copied. Unused folios in bio are unexpectedly marked\\nas uptodate.\\n\\n  vfs_read\\n    filemap_read\\n      filemap_get_pages\\n        filemap_readahead\\n          erofs_fileio_readahead\\n            erofs_fileio_rq_submit\\n              vfs_iocb_iter_read\\n                filemap_read\\n                  filemap_get_pages  \u003c= detect signal\\n              erofs_fileio_ki_complete  \u003c= set all folios uptodate\\n\\nThis patch addresses this by setting short read bio with an error\\ndirectly.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.12.75\",\"versionEndExcluding\":\"6.12.80\",\"matchCriteriaId\":\"E823EB64-1F92-40BB-891C-D94D00EDA086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.18.14\",\"versionEndExcluding\":\"6.18.21\",\"matchCriteriaId\":\"DEA57E4E-36B0-40D5-98B9-6A50348C9E74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.19.4\",\"versionEndExcluding\":\"6.19.11\",\"matchCriteriaId\":\"A67B0458-DAE3-4940-BBB2-1A4D263AF27B\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/5a5f23ef5431639db1ac3a0b274aef3a84cc413c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/5cf3972c8221abdb1b464a14ccf8103d840b9085\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d1ba7d6b3cd1757b108d7b6856c92ae661d6c323\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/eade54040384f54b7fb330e4b0975c5734850b3c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…