erofs: set fileio bio failed in short read case
Summary
| CVE | CVE-2026-31514 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-22 14:16:50 UTC |
| Updated | 2026-04-23 16:17:41 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: erofs: set fileio bio failed in short read case For file-backed mount, IO requests are handled by vfs_iocb_iter_read(). However, it can be interrupted by SIGKILL, returning the number of bytes actually copied. Unused folios in bio are unexpectedly marked as uptodate. vfs_read filemap_read filemap_get_pages filemap_readahead erofs_fileio_readahead erofs_fileio_rq_submit vfs_iocb_iter_read filemap_read filemap_get_pages <= detect signal erofs_fileio_ki_complete <= set all folios uptodate This patch addresses this by setting short read bio with an error directly. |
Risk And Classification
EPSS: 0.000180000 probability, percentile 0.045840000 (date 2026-04-24)
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected 8d582d65d20bb4796db01b19e86909ad68cb337b d1ba7d6b3cd1757b108d7b6856c92ae661d6c323 git | Not specified |
| CNA | Linux | Linux | affected e49abde0ffc382a967b24f326d1614ac3bb06a94 5cf3972c8221abdb1b464a14ccf8103d840b9085 git | Not specified |
| CNA | Linux | Linux | affected fe4039034dcdf584afbf763787909e28e92a4927 5a5f23ef5431639db1ac3a0b274aef3a84cc413c git | Not specified |
| CNA | Linux | Linux | affected bc804a8d7e865ef47fb7edcaf5e77d18bf444ebc eade54040384f54b7fb330e4b0975c5734850b3c git | Not specified |
| CNA | Linux | Linux | affected 6.12.75 6.12.80 semver | Not specified |
| CNA | Linux | Linux | affected 6.18.14 6.18.21 semver | Not specified |
| CNA | Linux | Linux | affected 6.19.4 6.19.11 semver | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/eade54040384f54b7fb330e4b0975c5734850b3c | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/5a5f23ef5431639db1ac3a0b274aef3a84cc413c | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/5cf3972c8221abdb1b464a14ccf8103d840b9085 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/d1ba7d6b3cd1757b108d7b6856c92ae661d6c323 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.