Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-23047

CVE-2026-23047: Linux Kernel Privilege Escalation Flaw

CVE-2026-23047 is a privilege escalation vulnerability in the Linux kernel affecting the libceph component. This flaw can cause system hangs and prevent proper resource cleanup. This article covers technical details, impact, and mitigations.

Published: February 6, 2026

CVE-2026-23047 Overview

A logic error vulnerability has been identified in the Linux kernel's libceph module, specifically in the calc_target() function. The function fails to properly set the t->paused flag when requests should be paused, while only implementing logic to clear the flag when requests should resume. This incomplete state management creates a critical issue for linger requests (such as watch operations), which rely on proper pause state tracking for reestablishment after transitions.

Critical Impact

This vulnerability can cause RBD (RADOS Block Device) images to become permanently locked, with rbd_dev->watch_mutex held indefinitely. Affected systems may experience unresponsive block devices that cannot be unmapped, requiring system restart to recover.

Affected Products

  • Linux kernel with Ceph/RBD support enabled
  • Systems using libceph module for Ceph storage communication
  • Environments utilizing RBD block device mappings

Discovery Timeline

  • 2026-02-04 - CVE CVE-2026-23047 published to NVD
  • 2026-02-04 - Last updated in NVD database

Technical Details for CVE-2026-23047

Vulnerability Analysis

The vulnerability resides in the calc_target() function within the libceph kernel module. This function is responsible for determining the target OSD (Object Storage Daemon) for Ceph requests and managing the pause state of those requests. The core issue is an asymmetric implementation of pause state management.

While calc_target() correctly clears the t->paused flag when a request should transition from paused to active state, it never sets this flag when a request should be paused. Instead, the setting of t->paused is delegated to __submit_request(). This approach works for regular requests but creates a critical gap for linger requests.

Linger requests, such as watch operations used by RBD, do not pass through __submit_request() in the same manner as regular requests. Consequently, when conditions require a linger request to be paused, the lreq->t.paused flag is never set. This leads to a cascade of failures when the system attempts to reestablish watches after pause/unpause transitions.

Root Cause

The root cause is incomplete state machine implementation in calc_target(). The function has the necessary context to determine when a request should be paused (it already checks these conditions to clear the pause state), but the code path to set the pause flag was never implemented. This creates an asymmetric state transition where:

  1. Requests can transition from paused → active (flag cleared by calc_target())
  2. Requests cannot properly transition from active → paused for linger types (flag never set)

The dependency on __submit_request() for setting the pause flag is architectural debt that fails to account for the different handling of linger requests in the Ceph client subsystem.

Attack Vector

This is a local denial of service condition that manifests under specific operational scenarios. The vulnerability triggers when:

  1. A watch request is established on an RBD device
  2. Network conditions or OSD state changes cause requests to be paused long enough for the unwatch request to time out
  3. A subsequent rewatch request enters what should be a paused state
  4. Because the pause flag is never set, the request fails to be placed on the need_resend_linger list

The attack vector is indirect—while an attacker cannot directly exploit this for code execution, they could potentially trigger the condition by manipulating network connectivity or Ceph cluster state in environments where they have partial access. The result is a persistent denial of service where:

  • The rbd_register_watch() function blocks indefinitely waiting for lreq->reg_commit_wait completion
  • The rbd_dev->watch_mutex remains held
  • Any attempt to unmap the RBD device (via rbd unmap) hangs in D (uninterruptible sleep) state

Detection Methods for CVE-2026-23047

Indicators of Compromise

  • Processes stuck in D (uninterruptible sleep) state when attempting rbd unmap operations
  • Stale Ceph watch registrations that fail to reestablish after network disruptions
  • Kernel log messages indicating linger_reg_commit_wait timeouts or watch registration failures
  • Hung rbd_reregister_watch() calls visible in kernel stack traces

Detection Strategies

  • Monitor for processes in uninterruptible sleep state related to RBD operations using ps aux | grep " D" combined with stack trace analysis
  • Implement watchdog monitoring on Ceph watch registration operations with timeout alerts
  • Use kernel tracing (ftrace or bpftrace) to monitor calc_target() function calls and pause flag state transitions
  • Check for mutex contention on rbd_dev->watch_mutex using lock debugging tools

Monitoring Recommendations

  • Enable Ceph client debug logging to track watch establishment and timeout patterns
  • Implement automated health checks for RBD device mappings to detect stuck operations
  • Configure alerts for abnormally long watch registration times or repeated registration attempts
  • Monitor kernel memory for potential resource leaks from stuck linger requests

How to Mitigate CVE-2026-23047

Immediate Actions Required

  • Apply the kernel patches from the stable kernel tree addressing this vulnerability
  • If immediate patching is not possible, plan maintenance windows to restart systems that show symptoms of stuck RBD mappings
  • Review and potentially increase timeout values for watch operations to reduce the likelihood of triggering the race condition
  • Consider implementing redundant storage paths to minimize impact of individual RBD device issues

Patch Information

Multiple patches have been released to the Linux kernel stable branches to address this vulnerability. The fix modifies calc_target() to properly set t->paused when pause conditions are detected, ensuring consistent state management for both regular and linger requests.

Available patches:

  • Kernel Patch Update 2b3329b3
  • Kernel Patch Update 4d3399c5
  • Kernel Patch Update 4ebc711b
  • Kernel Patch Update 5647d42c
  • Kernel Patch Update 5d0dc83c
  • Kernel Patch Update 6f468f6f
  • Kernel Patch Update c0fe2994

Workarounds

  • If a system becomes affected, the only reliable workaround is to restart the system to release the held mutex and clear stuck requests
  • Implement proactive monitoring to detect early signs of watch registration issues and trigger preemptive maintenance
  • In clustered environments, consider failing over workloads from affected nodes before the condition fully manifests
  • Reduce frequency of pause/unpause transitions by ensuring stable network connectivity to Ceph clusters
bash
# Configuration example
# Check for affected processes
ps aux | grep -E "(rbd|ceph)" | grep " D"

# View kernel stack traces for stuck processes
cat /proc/$(pgrep -f "rbd unmap")/stack

# Monitor Ceph client watch status
cat /sys/kernel/debug/ceph/*/osdc

# Force unmount if needed (may require reboot)
echo 1 > /sys/bus/rbd/remove_single_major

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechLinux Kernel

  • SeverityNONE

  • CVSS ScoreN/A

  • EPSS Probability0.02%

  • Known ExploitedNo
  • Impact Assessment
  • ConfidentialityNone
  • IntegrityNone
  • AvailabilityNone
  • Technical References
  • Kernel Patch Update 2b3329b3

  • Kernel Patch Update 4d3399c5

  • Kernel Patch Update 4ebc711b

  • Kernel Patch Update 5647d42c

  • Kernel Patch Update 5d0dc83c

  • Kernel Patch Update 6f468f6f

  • Kernel Patch Update c0fe2994
  • Related CVEs
  • CVE-2026-31430: Linux Kernel Privilege Escalation Flaw

  • CVE-2026-31443: Linux Kernel Privilege Escalation Flaw

  • CVE-2026-31463: Linux Kernel Privilege Escalation Flaw

  • CVE-2026-31459: Linux Kernel Privilege Escalation Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English