CVE-2026-31514
Received Received - Intake
Improper Bio Handling in Linux EROFS Causes Data Integrity Risk

Publication date: 2026-04-22

Last updated on: 2026-04-28

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: erofs: set fileio bio failed in short read case For file-backed mount, IO requests are handled by vfs_iocb_iter_read(). However, it can be interrupted by SIGKILL, returning the number of bytes actually copied. Unused folios in bio are unexpectedly marked as uptodate. vfs_read filemap_read filemap_get_pages filemap_readahead erofs_fileio_readahead erofs_fileio_rq_submit vfs_iocb_iter_read filemap_read filemap_get_pages <= detect signal erofs_fileio_ki_complete <= set all folios uptodate This patch addresses this by setting short read bio with an error directly.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-22
Last Modified
2026-04-28
Generated
2026-05-07
AI Q&A
2026-04-22
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
linux linux_kernel From 6.12.75 (inc) to 6.12.80 (exc)
linux linux_kernel From 6.18.14 (inc) to 6.18.21 (exc)
linux linux_kernel From 6.19.4 (inc) to 6.19.11 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's erofs file system related to how IO requests are handled during file-backed mounts. Specifically, when a read operation is interrupted by a SIGKILL signal, the function vfs_iocb_iter_read() returns the number of bytes actually copied, but the unused memory pages (folios) in the bio structure are incorrectly marked as up-to-date. This can cause inconsistencies because the system believes data has been correctly read when it has not.

The issue arises in the sequence of function calls handling the read operation, where the signal interruption is detected but the subsequent marking of folios as up-to-date happens regardless, leading to potential data integrity problems. The patch fixes this by setting an error on the short read bio directly, preventing the incorrect marking.


How can this vulnerability impact me? :

This vulnerability can impact you by causing data integrity issues during file read operations on the erofs file system in the Linux kernel. Because unused folios are incorrectly marked as up-to-date after an interrupted read, applications or systems relying on this data might read stale or incomplete data without being aware of the error.

Such silent data corruption can lead to application errors, incorrect processing of data, or system instability, especially in environments where accurate file reads are critical.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart