{"id":"CVE-2026-23136","summary":"libceph: reset sparse-read state in osd_fault()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: reset sparse-read state in osd_fault()\n\nWhen a fault occurs, the connection is abandoned, reestablished, and any\npending operations are retried. The OSD client tracks the progress of a\nsparse-read reply using a separate state machine, largely independent of\nthe messenger's state.\n\nIf a connection is lost mid-payload or the sparse-read state machine\nreturns an error, the sparse-read state is not reset. The OSD client\nwill then interpret the beginning of a new reply as the continuation of\nthe old one. If this makes the sparse-read machinery enter a failure\nstate, it may never recover, producing loops like:\n\n  libceph:  [0] got 0 extents\n  libceph: data len 142248331 != extent len 0\n  libceph: osd0 (1)...:6801 socket error on read\n  libceph: data len 142248331 != extent len 0\n  libceph: osd0 (1)...:6801 socket error on read\n\nTherefore, reset the sparse-read state in osd_fault(), ensuring retries\nstart from a clean state.","modified":"2026-05-07T01:44:15.606580891Z","published":"2026-02-14T15:22:21.952Z","related":["ALSA-2026:13565","SUSE-SU-2026:1573-1","SUSE-SU-2026:1661-1","SUSE-SU-2026:20838-1","SUSE-SU-2026:20931-1","SUSE-SU-2026:21114-1","SUSE-SU-2026:21123-1","SUSE-SU-2026:21255-1","SUSE-SU-2026:21284-1","openSUSE-SU-2026:20416-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23136.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/10b7c72810364226f7b27916ea3e2a4f870bc04b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/11194b416ef95012c2cfe5f546d71af07b639e93"},{"type":"WEB","url":"https://git.kernel.org/stable/c/90a60fe61908afa0eaf7f8fcf1421b9b50e5f7ff"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e94075e950a6598e710b9f7dffea5aa388f40313"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23136.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23136"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"f628d799972799023d32c2542bb2639eb8c4f84e"},{"fixed":"90a60fe61908afa0eaf7f8fcf1421b9b50e5f7ff"},{"fixed":"e94075e950a6598e710b9f7dffea5aa388f40313"},{"fixed":"10b7c72810364226f7b27916ea3e2a4f870bc04b"},{"fixed":"11194b416ef95012c2cfe5f546d71af07b639e93"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23136.json"}}],"schema_version":"1.7.5"}