CVE-2026-23050
Deadlock Vulnerability in Linux Kernel pNFS Delegation Handling
Publication date: 2026-02-04
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's pNFS (parallel Network File System) implementation. It causes a deadlock when returning a delegation during the open() operation.
Specifically, the problem occurs because the delegreturn function waits for a layout return that cannot complete. This happens because a state recovery process has started, which itself cannot complete until the open() finishes processing the delegations it was given. This circular wait leads to a hang or deadlock.
The fix involves propagating existing flags that indicate a non-blocking call to the pnfs_roc() function, so it knows not to wait in this situation, preventing the deadlock.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to hang or deadlock during file open operations involving pNFS delegations.
Such a deadlock can lead to system unresponsiveness or degraded performance, potentially affecting applications relying on network file systems and causing service interruptions.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as a deadlock or hang in the Linux kernel related to pNFS delegation returns during open() operations.
Detection can involve monitoring for system hangs or kernel stack traces similar to the one reported, which includes functions like __schedule, pnfs_roc, and nfs4_proc_delegreturn.
You can check for kernel logs indicating hangs or deadlocks using commands such as:
- dmesg | grep -i 'pnfs_roc'
- journalctl -k | grep -i 'nfs4_proc_delegreturn'
- ps -ef | grep nfs
Additionally, monitoring for processes stuck in uninterruptible sleep (D state) using:
- ps aux | awk '$8=="D"'
may help identify hangs caused by this issue.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved by propagating non-blocking flags to the pnfs_roc() function to avoid deadlocks during delegation returns.
Immediate mitigation steps include:
- Update the Linux kernel to a version that includes the fix for this vulnerability.
- If updating immediately is not possible, consider restarting affected NFS services or the system to clear any existing deadlocks.
- Monitor system logs and kernel messages for signs of the deadlock to respond promptly.