{"id":"CVE-2026-23047","summary":"libceph: make calc_target() set t-\u003epaused, not just clear it","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: make calc_target() set t-\u003epaused, not just clear it\n\nCurrently calc_target() clears t-\u003epaused if the request shouldn't be\npaused anymore, but doesn't ever set t-\u003epaused even though it's able to\ndetermine when the request should be paused.  Setting t-\u003epaused is left\nto __submit_request() which is fine for regular requests but doesn't\nwork for linger requests -- since __submit_request() doesn't operate\non linger requests, there is nowhere for lreq-\u003et.paused to be set.\nOne consequence of this is that watches don't get reestablished on\npaused -\u003e unpaused transitions in cases where requests have been paused\nlong enough for the (paused) unwatch request to time out and for the\nsubsequent (re)watch request to enter the paused state.  On top of the\nwatch not getting reestablished, rbd_reregister_watch() gets stuck with\nrbd_dev-\u003ewatch_mutex held:\n\n  rbd_register_watch\n    __rbd_register_watch\n      ceph_osdc_watch\n        linger_reg_commit_wait\n\nIt's waiting for lreq-\u003ereg_commit_wait to be completed, but for that to\nhappen the respective request needs to end up on need_resend_linger list\nand be kicked when requests are unpaused.  There is no chance for that\nif the request in question is never marked paused in the first place.\n\nThe fact that rbd_dev-\u003ewatch_mutex remains taken out forever then\nprevents the image from getting unmapped -- \"rbd unmap\" would inevitably\nhang in D state on an attempt to grab the mutex.","modified":"2026-04-02T17:29:35.761619624Z","published":"2026-02-04T16:00:29.475Z","related":["SUSE-SU-2026:20838-1","SUSE-SU-2026:20931-1","openSUSE-SU-2026:20416-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23047.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/2b3329b3c29d9e188e40d902d5230c2d5989b940"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4d3399c52e0e61720ae898f5a0b5b75d4460ae24"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4ebc711b738d139cabe2fc9e7e7749847676a342"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5647d42c47b535573b63e073e91164d6a5bb058c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5d0dc83cb9a69c1d0bea58f1c430199b05f6b021"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6f468f6ff233c6a81e0e761d9124e982903fe9a5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c0fe2994f9a9d0a2ec9e42441ea5ba74b6a16176"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23047.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23047"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"922dab6134178cae317ae00de86376cba59f3147"},{"fixed":"2b3329b3c29d9e188e40d902d5230c2d5989b940"},{"fixed":"5d0dc83cb9a69c1d0bea58f1c430199b05f6b021"},{"fixed":"4d3399c52e0e61720ae898f5a0b5b75d4460ae24"},{"fixed":"4ebc711b738d139cabe2fc9e7e7749847676a342"},{"fixed":"6f468f6ff233c6a81e0e761d9124e982903fe9a5"},{"fixed":"5647d42c47b535573b63e073e91164d6a5bb058c"},{"fixed":"c0fe2994f9a9d0a2ec9e42441ea5ba74b6a16176"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23047.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.7.0"},{"fixed":"5.10.248"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.198"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.161"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.121"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.66"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.18.6"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23047.json"}}],"schema_version":"1.7.5"}