Description
In the Linux kernel, the following vulnerability has been resolved:

fs/writeback: skip AS_NO_DATA_INTEGRITY mappings in wait_sb_inodes()

Above the while() loop in wait_sb_inodes(), we document that we must wait
for all pages under writeback for data integrity. Consequently, if a
mapping, like fuse, traditionally does not have data integrity semantics,
there is no need to wait at all; we can simply skip these inodes.

This restores fuse back to prior behavior where syncs are no-ops. This
fixes a user regression where if a system is running a faulty fuse server
that does not reply to issued write requests, this causes wait_sb_inodes()
to wait forever.
Published: 2026-02-04
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

A bug in the Linux kernel’s writeback logic causes the wait_sb_inodes() function to skip data‑integrity checks for filesystems that do not provide them, such as FUSE mounts. When a FUSE server fails to acknowledge write requests, the waiting loop can block indefinitely, resulting in a denial‑of‑service condition that stalls sync operations and can leave higher‑level processes hanging. The weakness is identified as CWE‑835.

Affected Systems

This issue is present in the Linux kernel starting from the 6.19 release candidates through rc6, as indicated by the CPE strings. Any kernel build that incorporates the unchanged writeback code is vulnerable, and upstream stable kernels that eventually receive the patch will also be affected. No specific distribution names were supplied, so all Linux kernel installations that have not applied the fix are at risk.

Risk and Exploitability

The CVSS score of 5.5 places the vulnerability in the medium severity range. The EPSS score of less than 1 % suggests a low chance of exploitation, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires a faulty or malicious FUSE server that the target system mounts, making the attack vector local or remote to the mount point. While the impact is limited to the host executing sync operations, it can lead to resource starvation or a hung system, but does not grant privilege escalation or data theft.

Generated by OpenCVE AI on April 17, 2026 at 23:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a patched version (for example 6.19 rc7 or later) or apply the upstream source fix for wait_sb_inodes().
  • If a kernel upgrade cannot be performed immediately, unmount or avoid mounting suspicious FUSE filesystems until the patch is applied, or use sync options that skip sync on those mounts.
  • Verify that any FUSE server you rely on responds to write requests; add health checks or enforce timeouts in the client.
  • Monitor system logs for prolonged sync activity and set alerts on excessive wait times.

Generated by OpenCVE AI on April 17, 2026 at 23:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-835
CPEs cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*

Thu, 05 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Wed, 04 Feb 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: fs/writeback: skip AS_NO_DATA_INTEGRITY mappings in wait_sb_inodes() Above the while() loop in wait_sb_inodes(), we document that we must wait for all pages under writeback for data integrity. Consequently, if a mapping, like fuse, traditionally does not have data integrity semantics, there is no need to wait at all; we can simply skip these inodes. This restores fuse back to prior behavior where syncs are no-ops. This fixes a user regression where if a system is running a faulty fuse server that does not reply to issued write requests, this causes wait_sb_inodes() to wait forever.
Title fs/writeback: skip AS_NO_DATA_INTEGRITY mappings in wait_sb_inodes()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-02-09T08:38:50.471Z

Reserved: 2026-01-13T15:37:45.967Z

Link: CVE-2026-23109

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-02-04T17:16:21.783

Modified: 2026-03-18T14:10:20.270

Link: CVE-2026-23109

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-02-04T00:00:00Z

Links: CVE-2026-23109 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T23:30:15Z

Weaknesses