netfs: Fix kernel BUG in netfs_limit_iter() for ITER_KVEC iterators
Summary
| CVE | CVE-2026-31438 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-22 14:16:37 UTC |
| Updated | 2026-04-23 16:17:41 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: netfs: Fix kernel BUG in netfs_limit_iter() for ITER_KVEC iterators When a process crashes and the kernel writes a core dump to a 9P filesystem, __kernel_write() creates an ITER_KVEC iterator. This iterator reaches netfs_limit_iter() via netfs_unbuffered_write(), which only handles ITER_FOLIOQ, ITER_BVEC and ITER_XARRAY iterator types, hitting the BUG() for any other type. Fix this by adding netfs_limit_kvec() following the same pattern as netfs_limit_bvec(), since both kvec and bvec are simple segment arrays with pointer and length fields. Dispatch it from netfs_limit_iter() when the iterator type is ITER_KVEC. |
Risk And Classification
EPSS: 0.000180000 probability, percentile 0.046200000 (date 2026-04-26)
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected cae932d3aee55035a54415dcea8e7ecf2ec469b5 18c2e20b42dd21db599e42d05ddaeeb647b2bb6d git | Not specified |
| CNA | Linux | Linux | affected cae932d3aee55035a54415dcea8e7ecf2ec469b5 4bc2d72c7695cedf6d4e1a558924903c2b28a78e git | Not specified |
| CNA | Linux | Linux | affected cae932d3aee55035a54415dcea8e7ecf2ec469b5 00d6df7115f6972370974212de9088087820802e git | Not specified |
| CNA | Linux | Linux | affected cae932d3aee55035a54415dcea8e7ecf2ec469b5 67e467a11f62ff64ad219dc6aa5459e132c79d14 git | Not specified |
| CNA | Linux | Linux | affected 6.8 | Not specified |
| CNA | Linux | Linux | unaffected 6.8 semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.80 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.21 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.11 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/00d6df7115f6972370974212de9088087820802e | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/4bc2d72c7695cedf6d4e1a558924903c2b28a78e | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/18c2e20b42dd21db599e42d05ddaeeb647b2bb6d | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/67e467a11f62ff64ad219dc6aa5459e132c79d14 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.