CVE-2026-23168

Source
https://cve.org/CVERecord?id=CVE-2026-23168
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23168.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-23168
Downstream
Published
2026-02-14T16:01:31.465Z
Modified
2026-04-02T13:12:09.347157Z
Summary
flex_proportions: make fprop_new_period() hardirq safe
Details

In the Linux kernel, the following vulnerability has been resolved:

flexproportions: make fpropnew_period() hardirq safe

Bernd has reported a lockdep splat from flexible proportions code that is essentially complaining about the following race:

<timer fires> runtimersoftirq - we are in softirq context calltimerfn writeoutperiod fpropnewperiod writeseqcount_begin(&p->sequence);

    &lt;hardirq is raised>
    ...
    blk_mq_end_request()
  blk_update_request()
    ext4_end_bio()
      folio_end_writeback()
    __wb_writeout_add()
      __fprop_add_percpu_max()
        if (unlikely(max_frac < FPROP_FRAC_BASE)) {
          fprop_fraction_percpu()
        seq = read_seqcount_begin(&p->sequence);
          - sees odd sequence so loops indefinitely

Note that a deadlock like this is only possible if the bdi has configured maximum fraction of writeout throughput which is very rare in general but frequent for example for FUSE bdis. To fix this problem we have to make sure write section of the sequence counter is irqsafe.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23168.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a91befde350375b1ff954635acdde14dc92cd9a8
Fixed
0acc9ba7a1b5ba4d998c5753e709be904e179b75
Fixed
884b2590ffcc7222cbbd6298051f4c243cc36f5d
Fixed
78ede9ebd679dadf480dce6f7b798e3603f88348
Fixed
b91a84299d72ae0e05551e851e47cd3008bd025b
Fixed
dd9e2f5b38f1fdd49b1ab6d3a85f81c14369eacc

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23168.json"