CVE-2026-23109
Infinite Wait Vulnerability in Linux Kernel FUSE Writeback Handling
Publication date: 2026-02-04
Last updated on: 2026-03-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.16 (inc) to 6.18.8 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-835 | The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's file system writeback mechanism. Specifically, it involves the function wait_sb_inodes() which waits for all pages under writeback to ensure data integrity.
The issue arises because some mappings, like fuse (Filesystem in Userspace), traditionally do not have data integrity semantics. The vulnerability caused the system to wait indefinitely if a faulty fuse server did not respond to write requests, leading to a hang.
The fix skips waiting on these AS_NO_DATA_INTEGRITY mappings, restoring fuse behavior so that sync operations become no-ops, preventing the system from waiting forever.
How can this vulnerability impact me? :
If your system uses fuse filesystems and is connected to a faulty fuse server that does not reply to write requests, this vulnerability could cause the system to hang indefinitely during writeback operations.
This means that processes waiting for writeback completion could be blocked forever, potentially causing system instability or degraded performance.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know