CVE-2026-23168
📋 TL;DR
A race condition in the Linux kernel's flexible proportions subsystem can cause indefinite loops when writeout throughput limits are configured. This affects systems using FUSE filesystems or other configurations with maximum writeout fraction settings. The vulnerability requires specific timing conditions between timer interrupts and hardware interrupts.
💻 Affected Systems
- Linux kernel
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
System hangs or becomes unresponsive due to indefinite loops in kernel code, potentially requiring hard reboot.
Likely Case
System instability or performance degradation under specific workloads with FUSE filesystems.
If Mitigated
No impact for systems without maximum writeout fraction configuration (most common configurations).
🎯 Exploit Status
Requires local access, specific kernel configuration, and precise timing between softirq and hardirq contexts
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Multiple stable kernel versions with commits referenced in CVE
Vendor Advisory: https://git.kernel.org/stable/c/0acc9ba7a1b5ba4d998c5753e709be904e179b75
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable maximum writeout fraction
allAvoid configuring maximum writeout throughput fraction for block devices
# Check current configuration: cat /sys/block/*/bdi/max_ratio
# Set to default (100): echo 100 > /sys/block/[device]/bdi/max_ratio
🧯 If You Can't Patch
- Avoid using FUSE filesystems or disable maximum writeout fraction configuration
- Monitor system for hangs or performance issues and have reboot procedures ready
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if maximum writeout fraction is configured: uname -r && cat /sys/block/*/bdi/max_ratio | grep -v '^100$'
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is updated and check for presence of fix commits in kernel source
📡 Detection & Monitoring
Log Indicators:
- Kernel hangs
- System becomes unresponsive
- High CPU usage in kernel threads
Network Indicators:
- None - local kernel issue
SIEM Query:
Search for kernel panic messages, system hang alerts, or watchdog timeouts
🔗 References
- https://git.kernel.org/stable/c/0acc9ba7a1b5ba4d998c5753e709be904e179b75
- https://git.kernel.org/stable/c/78ede9ebd679dadf480dce6f7b798e3603f88348
- https://git.kernel.org/stable/c/884b2590ffcc7222cbbd6298051f4c243cc36f5d
- https://git.kernel.org/stable/c/b91a84299d72ae0e05551e851e47cd3008bd025b
- https://git.kernel.org/stable/c/dd9e2f5b38f1fdd49b1ab6d3a85f81c14369eacc