Description
In the Linux kernel, the following vulnerability has been resolved:

erofs: set fileio bio failed in short read case

For file-backed mount, IO requests are handled by vfs_iocb_iter_read().
However, it can be interrupted by SIGKILL, returning the number of
bytes actually copied. Unused folios in bio are unexpectedly marked
as uptodate.

vfs_read
filemap_read
filemap_get_pages
filemap_readahead
erofs_fileio_readahead
erofs_fileio_rq_submit
vfs_iocb_iter_read
filemap_read
filemap_get_pages <= detect signal
erofs_fileio_ki_complete <= set all folios uptodate

This patch addresses this by setting short read bio with an error
directly.
Published: 2026-04-22
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Data Integrity
Action: Patch
AI Analysis

Impact

The erofs filesystem in the Linux kernel contains a flaw that occurs when a file‑backed mount is read and the read operation is interrupted by a SIGKILL signal. In the error handling path, unused folios in the bio are incorrectly marked as up‑to‑date. As a result, the kernel may treat those pages as containing valid data even though they have not been fully read. This mis‑labeling can cause applications to read stale or uninitialized data, potentially leading to incorrect program behavior.

Affected Systems

All Linux kernel releases that have not incorporated the recent erofs commit sequence are affected. The CVE data does not list specific kernel versions, so any kernel without those commits is at risk.

Risk and Exploitability

The CVSS score of 5.5 indicates moderate severity, while the EPSS score of less than 1% suggests a low probability of exploitation at the time of this analysis. The vulnerability is not listed in the CISA KEV catalog. Exploitation would likely require a local user who can trigger a read on a file‑backed erofs filesystem and cause an interrupt; once the issue triggers, the user may observe incorrect data from the kernel. No evidence of remote code execution or denial of service is present in the available information.

Generated by OpenCVE AI on April 29, 2026 at 03:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the kernel patch that implements the short‑read bio error handling as referenced in the commit URLs.
  • Restrict the users who can mount file‑backed erofs filesystems to trusted accounts or isolate mounts within a restricted security context.
  • If the patch is not yet available, mount the affected filesystem as read‑only or disable erofs support until the fix is applied.

Generated by OpenCVE AI on April 29, 2026 at 03:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
CWE-788

Tue, 28 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo

Thu, 23 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-364
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Wed, 22 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
CWE-788

Wed, 22 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: erofs: set fileio bio failed in short read case For file-backed mount, IO requests are handled by vfs_iocb_iter_read(). However, it can be interrupted by SIGKILL, returning the number of bytes actually copied. Unused folios in bio are unexpectedly marked as uptodate. vfs_read filemap_read filemap_get_pages filemap_readahead erofs_fileio_readahead erofs_fileio_rq_submit vfs_iocb_iter_read filemap_read filemap_get_pages <= detect signal erofs_fileio_ki_complete <= set all folios uptodate This patch addresses this by setting short read bio with an error directly.
Title erofs: set fileio bio failed in short read case
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:10:16.061Z

Reserved: 2026-03-09T15:48:24.107Z

Link: CVE-2026-31514

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-22T14:16:50.810

Modified: 2026-04-28T16:19:39.717

Link: CVE-2026-31514

cve-icon Redhat

Severity : Low

Publid Date: 2026-04-22T00:00:00Z

Links: CVE-2026-31514 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T04:00:13Z

Weaknesses