CVE-2026-23136

CWE-4407 documents7 sources
Severity
5.5MEDIUM
EPSS
0.0%
top 89.66%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 14

Description

In the Linux kernel, the following vulnerability has been resolved: libceph: reset sparse-read state in osd_fault() When a fault occurs, the connection is abandoned, reestablished, and any pending operations are retried. The OSD client tracks the progress of a sparse-read reply using a separate state machine, largely independent of the messenger's state. If a connection is lost mid-payload or the sparse-read state machine returns an error, the sparse-read state is not reset. The OSD client wi

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

NVDlinux/linux_kernel6.66.6.121+3
CVEListV5linux/linuxf628d799972799023d32c2542bb2639eb8c4f84e90a60fe61908afa0eaf7f8fcf1421b9b50e5f7ff+4
Debianlinux< 6.12.69-1+1

Patches

🔴Vulnerability Details

3
OSV
CVE-2026-23136: In the Linux kernel, the following vulnerability has been resolved: libceph: reset sparse-read state in osd_fault() When a fault occurs, the connectio2026-02-14
CVEList
libceph: reset sparse-read state in osd_fault()2026-02-14
GHSA
GHSA-v844-6465-jhqh: In the Linux kernel, the following vulnerability has been resolved: libceph: reset sparse-read state in osd_fault() When a fault occurs, the connect2026-02-14

📋Vendor Advisories

2
Red Hat
kernel: Linux kernel: Denial of Service in libceph OSD client due to unreset sparse-read state2026-02-14
Debian
CVE-2026-23136: linux - In the Linux kernel, the following vulnerability has been resolved: libceph: re...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23136 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23136 (MEDIUM CVSS 5.5) | In the Linux kernel | cvebase.io