CVE-2026-23136
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
14/02/2026
Last modified:
17/03/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
libceph: reset sparse-read state in osd_fault()<br />
<br />
When a fault occurs, the connection is abandoned, reestablished, and any<br />
pending operations are retried. The OSD client tracks the progress of a<br />
sparse-read reply using a separate state machine, largely independent of<br />
the messenger&#39;s state.<br />
<br />
If a connection is lost mid-payload or the sparse-read state machine<br />
returns an error, the sparse-read state is not reset. The OSD client<br />
will then interpret the beginning of a new reply as the continuation of<br />
the old one. If this makes the sparse-read machinery enter a failure<br />
state, it may never recover, producing loops like:<br />
<br />
libceph: [0] got 0 extents<br />
libceph: data len 142248331 != extent len 0<br />
libceph: osd0 (1)...:6801 socket error on read<br />
libceph: data len 142248331 != extent len 0<br />
libceph: osd0 (1)...:6801 socket error on read<br />
<br />
Therefore, reset the sparse-read state in osd_fault(), ensuring retries<br />
start from a clean state.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6 (including) | 6.6.121 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.66 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



