Description
In the Linux kernel, the following vulnerability has been resolved:

netfs: Fix read abandonment during retry

Under certain circumstances, all the remaining subrequests from a read
request will get abandoned during retry. The abandonment process expects
the 'subreq' variable to be set to the place to start abandonment from, but
it doesn't always have a useful value (it will be uninitialised on the
first pass through the loop and it may point to a deleted subrequest on
later passes).

Fix the first jump to "abandon:" to set subreq to the start of the first
subrequest expected to need retry (which, in this abandonment case, turned
out unexpectedly to no longer have NEED_RETRY set).

Also clear the subreq pointer after discarding superfluous retryable
subrequests to cause an oops if we do try to access it.
Published: 2026-04-22
Score: 7.0 High
EPSS: n/a
KEV: No
Impact: Denial of Service via kernel crash
Action: Apply Patch
AI Analysis

Impact

In the Linux kernel, the netfs module had an error where read requests could abandon all remaining subrequests during retry. The bug arises due to an uninitialized or dangling subrequest pointer, causing the kernel to trigger an oops and crash when the retry logic attempts to process invalid memory. This results in a denial of service, as the crash can bring the system down or require a reboot.

Affected Systems

All Linux kernel installations that include the netfs subsystem prior to the applied fix are affected, including standard distributions that ship the unpatched kernel. The issue resides in the network file system read handling code, so any system exposed to NFS traffic (clients or servers) is at risk.

Risk and Exploitability

The vulnerability is a critical kernel bug that can lead to a crash, but it lacks a publicly available exploitation reference. EPSS is not available and KEV does not list it, suggesting limited exploitation in the wild. The attack likely requires the ability to trigger a problematic read operation over a network file system, meaning that an attacker with network access to the affected service could potentially force a failure. The risk therefore remains high for exposed systems, and patching should be prioritized.

Generated by OpenCVE AI on April 22, 2026 at 19:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to the patched version where the netfs read abandonment bug is fixed.
  • Disable or remove netfs-related services (e.g., NFS clients or servers) if an update cannot be applied immediately.
  • Continuously monitor kernel logs for oops messages to detect any attempted exploitation.

Generated by OpenCVE AI on April 22, 2026 at 19:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-824
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Wed, 22 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416
CWE-457

Wed, 22 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: netfs: Fix read abandonment during retry Under certain circumstances, all the remaining subrequests from a read request will get abandoned during retry. The abandonment process expects the 'subreq' variable to be set to the place to start abandonment from, but it doesn't always have a useful value (it will be uninitialised on the first pass through the loop and it may point to a deleted subrequest on later passes). Fix the first jump to "abandon:" to set subreq to the start of the first subrequest expected to need retry (which, in this abandonment case, turned out unexpectedly to no longer have NEED_RETRY set). Also clear the subreq pointer after discarding superfluous retryable subrequests to cause an oops if we do try to access it.
Title netfs: Fix read abandonment during retry
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-22T13:53:35.032Z

Reserved: 2026-03-09T15:48:24.089Z

Link: CVE-2026-31435

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-22T14:16:36.710

Modified: 2026-04-22T14:16:36.710

Link: CVE-2026-31435

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-22T00:00:00Z

Links: CVE-2026-31435 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T19:30:24Z

Weaknesses