CVE-2026-23136
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
14/02/2026
Última modificación:
14/02/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
libceph: reset sparse-read state in osd_fault()<br />
<br />
When a fault occurs, the connection is abandoned, reestablished, and any<br />
pending operations are retried. The OSD client tracks the progress of a<br />
sparse-read reply using a separate state machine, largely independent of<br />
the messenger&#39;s state.<br />
<br />
If a connection is lost mid-payload or the sparse-read state machine<br />
returns an error, the sparse-read state is not reset. The OSD client<br />
will then interpret the beginning of a new reply as the continuation of<br />
the old one. If this makes the sparse-read machinery enter a failure<br />
state, it may never recover, producing loops like:<br />
<br />
libceph: [0] got 0 extents<br />
libceph: data len 142248331 != extent len 0<br />
libceph: osd0 (1)...:6801 socket error on read<br />
libceph: data len 142248331 != extent len 0<br />
libceph: osd0 (1)...:6801 socket error on read<br />
<br />
Therefore, reset the sparse-read state in osd_fault(), ensuring retries<br />
start from a clean state.



