{"api_version":"1","generated_at":"2026-04-25T06:31:18+00:00","cve":"CVE-2026-31514","urls":{"html":"https://cve.report/CVE-2026-31514","api":"https://cve.report/api/cve/CVE-2026-31514.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-31514","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-31514"},"summary":{"title":"erofs: set fileio bio failed in short read case","description":"In the Linux kernel, the following vulnerability has been resolved:\n\nerofs: set fileio bio failed in short read case\n\nFor file-backed mount, IO requests are handled by vfs_iocb_iter_read().\nHowever, it can be interrupted by SIGKILL, returning the number of\nbytes actually copied. Unused folios in bio are unexpectedly marked\nas uptodate.\n\n  vfs_read\n    filemap_read\n      filemap_get_pages\n        filemap_readahead\n          erofs_fileio_readahead\n            erofs_fileio_rq_submit\n              vfs_iocb_iter_read\n                filemap_read\n                  filemap_get_pages  <= detect signal\n              erofs_fileio_ki_complete  <= set all folios uptodate\n\nThis patch addresses this by setting short read bio with an error\ndirectly.","state":"PUBLISHED","assigner":"Linux","published_at":"2026-04-22 14:16:50","updated_at":"2026-04-23 16:17:41"},"problem_types":[],"metrics":[],"references":[{"url":"https://git.kernel.org/stable/c/eade54040384f54b7fb330e4b0975c5734850b3c","name":"https://git.kernel.org/stable/c/eade54040384f54b7fb330e4b0975c5734850b3c","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/5a5f23ef5431639db1ac3a0b274aef3a84cc413c","name":"https://git.kernel.org/stable/c/5a5f23ef5431639db1ac3a0b274aef3a84cc413c","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/5cf3972c8221abdb1b464a14ccf8103d840b9085","name":"https://git.kernel.org/stable/c/5cf3972c8221abdb1b464a14ccf8103d840b9085","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/d1ba7d6b3cd1757b108d7b6856c92ae661d6c323","name":"https://git.kernel.org/stable/c/d1ba7d6b3cd1757b108d7b6856c92ae661d6c323","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-31514","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-31514","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 8d582d65d20bb4796db01b19e86909ad68cb337b d1ba7d6b3cd1757b108d7b6856c92ae661d6c323 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected e49abde0ffc382a967b24f326d1614ac3bb06a94 5cf3972c8221abdb1b464a14ccf8103d840b9085 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected fe4039034dcdf584afbf763787909e28e92a4927 5a5f23ef5431639db1ac3a0b274aef3a84cc413c git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected bc804a8d7e865ef47fb7edcaf5e77d18bf444ebc eade54040384f54b7fb330e4b0975c5734850b3c git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 6.12.75 6.12.80 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 6.18.14 6.18.21 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 6.19.4 6.19.11 semver","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"31514","cve":"CVE-2026-31514","epss":"0.000180000","percentile":"0.045840000","score_date":"2026-04-24","updated_at":"2026-04-25 00:14:35"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["fs/erofs/fileio.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"d1ba7d6b3cd1757b108d7b6856c92ae661d6c323","status":"affected","version":"8d582d65d20bb4796db01b19e86909ad68cb337b","versionType":"git"},{"lessThan":"5cf3972c8221abdb1b464a14ccf8103d840b9085","status":"affected","version":"e49abde0ffc382a967b24f326d1614ac3bb06a94","versionType":"git"},{"lessThan":"5a5f23ef5431639db1ac3a0b274aef3a84cc413c","status":"affected","version":"fe4039034dcdf584afbf763787909e28e92a4927","versionType":"git"},{"lessThan":"eade54040384f54b7fb330e4b0975c5734850b3c","status":"affected","version":"bc804a8d7e865ef47fb7edcaf5e77d18bf444ebc","versionType":"git"}]},{"defaultStatus":"unaffected","product":"Linux","programFiles":["fs/erofs/fileio.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"6.12.80","status":"affected","version":"6.12.75","versionType":"semver"},{"lessThan":"6.18.21","status":"affected","version":"6.18.14","versionType":"semver"},{"lessThan":"6.19.11","status":"affected","version":"6.19.4","versionType":"semver"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.12.80","versionStartIncluding":"6.12.75","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.18.21","versionStartIncluding":"6.18.14","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.19.11","versionStartIncluding":"6.19.4","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nerofs: set fileio bio failed in short read case\n\nFor file-backed mount, IO requests are handled by vfs_iocb_iter_read().\nHowever, it can be interrupted by SIGKILL, returning the number of\nbytes actually copied. Unused folios in bio are unexpectedly marked\nas uptodate.\n\n  vfs_read\n    filemap_read\n      filemap_get_pages\n        filemap_readahead\n          erofs_fileio_readahead\n            erofs_fileio_rq_submit\n              vfs_iocb_iter_read\n                filemap_read\n                  filemap_get_pages  <= detect signal\n              erofs_fileio_ki_complete  <= set all folios uptodate\n\nThis patch addresses this by setting short read bio with an error\ndirectly."}],"providerMetadata":{"dateUpdated":"2026-04-22T13:54:31.531Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/d1ba7d6b3cd1757b108d7b6856c92ae661d6c323"},{"url":"https://git.kernel.org/stable/c/5cf3972c8221abdb1b464a14ccf8103d840b9085"},{"url":"https://git.kernel.org/stable/c/5a5f23ef5431639db1ac3a0b274aef3a84cc413c"},{"url":"https://git.kernel.org/stable/c/eade54040384f54b7fb330e4b0975c5734850b3c"}],"title":"erofs: set fileio bio failed in short read case","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2026-31514","datePublished":"2026-04-22T13:54:31.531Z","dateReserved":"2026-03-09T15:48:24.107Z","dateUpdated":"2026-04-22T13:54:31.531Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-22 14:16:50","lastModifiedDate":"2026-04-23 16:17:41","problem_types":[],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"31514","Ordinal":"1","Title":"erofs: set fileio bio failed in short read case","CVE":"CVE-2026-31514","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"31514","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\nerofs: set fileio bio failed in short read case\n\nFor file-backed mount, IO requests are handled by vfs_iocb_iter_read().\nHowever, it can be interrupted by SIGKILL, returning the number of\nbytes actually copied. Unused folios in bio are unexpectedly marked\nas uptodate.\n\n  vfs_read\n    filemap_read\n      filemap_get_pages\n        filemap_readahead\n          erofs_fileio_readahead\n            erofs_fileio_rq_submit\n              vfs_iocb_iter_read\n                filemap_read\n                  filemap_get_pages  <= detect signal\n              erofs_fileio_ki_complete  <= set all folios uptodate\n\nThis patch addresses this by setting short read bio with an error\ndirectly.","Type":"Description","Title":"erofs: set fileio bio failed in short read case"}]}}}