CVE-2026-31514
Improper Bio Handling in Linux EROFS Causes Data Integrity Risk
Publication date: 2026-04-22
Last updated on: 2026-04-28
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.12.75 (inc) to 6.12.80 (exc) |
| linux | linux_kernel | From 6.18.14 (inc) to 6.18.21 (exc) |
| linux | linux_kernel | From 6.19.4 (inc) to 6.19.11 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's erofs file system related to how IO requests are handled during file-backed mounts. Specifically, when a read operation is interrupted by a SIGKILL signal, the function vfs_iocb_iter_read() returns the number of bytes actually copied, but the unused memory pages (folios) in the bio structure are incorrectly marked as up-to-date. This can cause inconsistencies because the system believes data has been correctly read when it has not.
The issue arises in the sequence of function calls handling the read operation, where the signal interruption is detected but the subsequent marking of folios as up-to-date happens regardless, leading to potential data integrity problems. The patch fixes this by setting an error on the short read bio directly, preventing the incorrect marking.
How can this vulnerability impact me? :
This vulnerability can impact you by causing data integrity issues during file read operations on the erofs file system in the Linux kernel. Because unused folios are incorrectly marked as up-to-date after an interrupted read, applications or systems relying on this data might read stale or incomplete data without being aware of the error.
Such silent data corruption can lead to application errors, incorrect processing of data, or system instability, especially in environments where accurate file reads are critical.