CVE-2026-23136

Source
https://cve.org/CVERecord?id=CVE-2026-23136
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23136.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-23136
Downstream
Related
Published
2026-02-14T15:22:21.952Z
Modified
2026-03-28T17:44:42.702415657Z
Summary
libceph: reset sparse-read state in osd_fault()
Details

In the Linux kernel, the following vulnerability has been resolved:

libceph: reset sparse-read state in osd_fault()

When a fault occurs, the connection is abandoned, reestablished, and any pending operations are retried. The OSD client tracks the progress of a sparse-read reply using a separate state machine, largely independent of the messenger's state.

If a connection is lost mid-payload or the sparse-read state machine returns an error, the sparse-read state is not reset. The OSD client will then interpret the beginning of a new reply as the continuation of the old one. If this makes the sparse-read machinery enter a failure state, it may never recover, producing loops like:

libceph: [0] got 0 extents libceph: data len 142248331 != extent len 0 libceph: osd0 (1)...:6801 socket error on read libceph: data len 142248331 != extent len 0 libceph: osd0 (1)...:6801 socket error on read

Therefore, reset the sparse-read state in osd_fault(), ensuring retries start from a clean state.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23136.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f628d799972799023d32c2542bb2639eb8c4f84e
Fixed
90a60fe61908afa0eaf7f8fcf1421b9b50e5f7ff
Fixed
e94075e950a6598e710b9f7dffea5aa388f40313
Fixed
10b7c72810364226f7b27916ea3e2a4f870bc04b
Fixed
11194b416ef95012c2cfe5f546d71af07b639e93

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23136.json"