← Retour aux CVEs
CVE-2026-22990
HIGH7.5
Description
In the Linux kernel, the following vulnerability has been resolved: libceph: replace overzealous BUG_ON in osdmap_apply_incremental() If the osdmap is (maliciously) corrupted such that the incremental osdmap epoch is different from what is expected, there is no need to BUG. Instead, just declare the incremental osdmap to be invalid.
Details CVE
Score CVSS v3.17.5
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie1/23/2026
Derniere modification4/27/2026
Sourcenvd
Observations honeypot0
Produits affectes
linux:linux_kernel
Faiblesses (CWE)
CWE-617
References
https://git.kernel.org/stable/c/4b106fbb1c7b841cd402abd83eb2447164c799ea(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/6348d70af847b79805374fe628d3809a63fd7df3(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/6afd2a4213524bc742b709599a3663aeaf77193c(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/6c6cec3db3b418c4fdf815731bc39e46dff75e1b(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/9aa0b0c14cefece078286d78b97d4c09685e372d(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/d3613770e2677683e65d062da5e31f48c409abe9(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/e00c3f71b5cf75681dbd74ee3f982a99cb690c2b(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.