CVE-2026-23047
BaseFortify
Publication date: 2026-02-04
Last updated on: 2026-02-04
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's libceph component, specifically in the function calc_target(). The function currently clears the paused state (t->paused) of a request when it should no longer be paused, but it does not set the paused state when a request should be paused. This setting is only done in __submit_request(), which works for regular requests but not for linger requests.
Because linger requests never have their paused state set, watches do not get reestablished when transitioning from paused to unpaused states if the paused unwatch request times out and the subsequent rewatch request enters the paused state. This causes the function rbd_reregister_watch() to get stuck holding a mutex (rbd_dev->watch_mutex) indefinitely.
As a result, operations like 'rbd unmap' hang indefinitely because they cannot acquire the mutex, leading to a system state where resources remain locked and operations cannot complete.
How can this vulnerability impact me? :
This vulnerability can cause certain operations involving Ceph block devices to hang indefinitely. Specifically, the 'rbd unmap' command can get stuck waiting for a mutex that is never released due to the paused state not being properly set on linger requests.
This can lead to resource locking issues, where images cannot be unmapped and system processes remain in an uninterruptible sleep state (D state), potentially causing system instability or degraded performance.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know