Description
In the Linux kernel, the following vulnerability has been resolved:

erofs: set fileio bio failed in short read case

For file-backed mount, IO requests are handled by vfs_iocb_iter_read().
However, it can be interrupted by SIGKILL, returning the number of
bytes actually copied. Unused folios in bio are unexpectedly marked
as uptodate.

vfs_read
filemap_read
filemap_get_pages
filemap_readahead
erofs_fileio_readahead
erofs_fileio_rq_submit
vfs_iocb_iter_read
filemap_read
filemap_get_pages <= detect signal
erofs_fileio_ki_complete <= set all folios uptodate

This patch addresses this by setting short read bio with an error
directly.
Published: 2026-04-22
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Potential for information disclosure due to incorrect file read behavior
Action: Apply Patch
AI Analysis

Impact

This vulnerability arises in the Linux kernel's erofs filesystem when a short read operation is interrupted by a SIGKILL signal. The kernel incorrectly marks unused folios in the bio structure as uptodate, effectively allowing potentially stale or uninitialized data to be returned to the caller. The bug could be leveraged by an attacker to obtain data beyond the requested read boundaries or to influence program flow based on corrupted file data, resulting in information exposure or subtle integrity violations.

Affected Systems

All Linux kernel builds that contain the erofs filesystem and do not yet incorporate the recent fix are affected. No specific kernel version was provided; the issue is present in any build where the vfs_iocb_iter_read path and erofs_fileio_readahead logic are unpatched.

Risk and Exploitability

The CVSS score and EPSS are currently unavailable, and the bug is not listed in CISA’s KEV catalog. The attack vector is likely local, requiring the ability to mount an erofs filesystem and initiate a read operation that can be interrupted. While the flaw does not provide remote code execution capabilities, its traversal into uninitialized memory may allow privileged local users to read sensitive files or corrupt internal kernel structures. System administrators should treat the risk as moderate, focusing on patch deployment and limiting exposure on untrusted hosts.

Generated by OpenCVE AI on April 22, 2026 at 18:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a version that includes the erofs short‑read fix (e.g., apply the patch referenced in the cgit commit URLs).
  • Restrict mounting of file‑backed erofs filesystems to trusted users and avoid exposing them to untrusted code paths.
  • If an immediate upgrade is not possible, isolate the affected filesystem by mounting it read‑only or temporarily disabling it while monitoring for anomalous read behavior.

Generated by OpenCVE AI on April 22, 2026 at 18:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-364
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Wed, 22 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
CWE-788

Wed, 22 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: erofs: set fileio bio failed in short read case For file-backed mount, IO requests are handled by vfs_iocb_iter_read(). However, it can be interrupted by SIGKILL, returning the number of bytes actually copied. Unused folios in bio are unexpectedly marked as uptodate. vfs_read filemap_read filemap_get_pages filemap_readahead erofs_fileio_readahead erofs_fileio_rq_submit vfs_iocb_iter_read filemap_read filemap_get_pages <= detect signal erofs_fileio_ki_complete <= set all folios uptodate This patch addresses this by setting short read bio with an error directly.
Title erofs: set fileio bio failed in short read case
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-22T13:54:31.531Z

Reserved: 2026-03-09T15:48:24.107Z

Link: CVE-2026-31514

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-22T14:16:50.810

Modified: 2026-04-23T16:17:41.280

Link: CVE-2026-31514

cve-icon Redhat

Severity : Low

Publid Date: 2026-04-22T00:00:00Z

Links: CVE-2026-31514 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T18:45:24Z

Weaknesses