CVE-2026-31484
Description
In the Linux kernel, the following vulnerability has been resolved:
io_uring/fdinfo: fix OOB read in SQE_MIXED wrap check
__io_uring_show_fdinfo() iterates over pending SQEs and, for 128-byte SQEs on an IORING_SETUP_SQE_MIXED ring, needs to detect when the second half of the SQE would be past the end of the sq_sqes array. The current check tests (++sq_head & sq_mask) == 0, but sq_head is only incremented when a 128-byte SQE is encountered, not on every iteration. The actual array index is sq_idx = (i + sq_head) & sq_mask, which can be sq_mask (the last slot) while the wrap check passes.
Fix by checking sq_idx directly. Keep the sq_head increment so the loop still skips the second half of the 128-byte SQE on the next iteration.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An out-of-bounds read in Linux kernel's io_uring fdinfo handler can occur when processing 128-byte SQEs on mixed-size rings due to an incorrect wrap check.
Vulnerability
In the Linux kernel's io_uring subsystem, the __io_uring_show_fdinfo() function iterates over pending Submission Queue Entries (SQEs) to display information via /proc/self/fdinfo/<fd>. For rings configured with IORING_SETUP_SQE_MIXED, which allows 128-byte SQEs, the code must detect when the second half of a 128-byte SQE would exceed the bounds of the sq_sqes array. The original wrap check used (++sq_head & sq_mask) == 0, but sq_head is only incremented when a 128-byte SQE is encountered, not on every iteration. Consequently, the actual array index sq_idx = (i + sq_head) & sq_mask can equal sq_mask (the last slot) while the wrap check incorrectly passes, leading to an out-of-bounds read [1][2].
Exploitation
An attacker with the ability to create an io_uring instance with IORING_SETUP_SQE_MIXED and submit 128-byte SQEs can trigger this bug. The out-of-bounds read occurs when a user or process reads the fdinfo file for the io_uring file descriptor. No special privileges beyond the ability to create and use io_uring are required, but local access to the system is necessary.
Impact
The out-of-bounds read can leak sensitive kernel memory beyond the sq_sqes array. This information disclosure may reveal pointers, slab data, or other kernel structures, potentially aiding further exploitation. The vulnerability is rated High with a CVSS v3 score of 7.1.
Mitigation
The fix, which directly checks sq_idx instead of relying on the flawed wrap condition, has been backported to stable kernel trees [1][2]. Users should apply the latest kernel updates from their distribution. No workaround is available; updating the kernel is the recommended action.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
10cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 9 more
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=6.19.1,<6.19.11
- cpe:2.3:o:linux:linux_kernel:6.19:-:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
- (no CPE)
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.