Home

Description

In the Linux kernel, the following vulnerability has been resolved: libceph: replace overzealous BUG_ON in osdmap_apply_incremental() If the osdmap is (maliciously) corrupted such that the incremental osdmap epoch is different from what is expected, there is no need to BUG. Instead, just declare the incremental osdmap to be invalid.

PUBLISHED Reserved 2026-01-13 | Published 2026-01-23 | Updated 2026-02-09 | Assigner Linux

Product status

Default status
unaffected

f24e9980eb860d8600cbe5ef3d2fd9295320d229 (git) before 9aa0b0c14cefece078286d78b97d4c09685e372d
affected

f24e9980eb860d8600cbe5ef3d2fd9295320d229 (git) before 4b106fbb1c7b841cd402abd83eb2447164c799ea
affected

f24e9980eb860d8600cbe5ef3d2fd9295320d229 (git) before 6afd2a4213524bc742b709599a3663aeaf77193c
affected

f24e9980eb860d8600cbe5ef3d2fd9295320d229 (git) before d3613770e2677683e65d062da5e31f48c409abe9
affected

f24e9980eb860d8600cbe5ef3d2fd9295320d229 (git) before 6c6cec3db3b418c4fdf815731bc39e46dff75e1b
affected

f24e9980eb860d8600cbe5ef3d2fd9295320d229 (git) before 6348d70af847b79805374fe628d3809a63fd7df3
affected

f24e9980eb860d8600cbe5ef3d2fd9295320d229 (git) before e00c3f71b5cf75681dbd74ee3f982a99cb690c2b
affected

Default status
affected

2.6.34
affected

Any version before 2.6.34
unaffected

5.10.248 (semver)
unaffected

5.15.198 (semver)
unaffected

6.1.161 (semver)
unaffected

6.6.121 (semver)
unaffected

6.12.66 (semver)
unaffected

6.18.6 (semver)
unaffected

6.19 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/9aa0b0c14cefece078286d78b97d4c09685e372d

git.kernel.org/...c/4b106fbb1c7b841cd402abd83eb2447164c799ea

git.kernel.org/...c/6afd2a4213524bc742b709599a3663aeaf77193c

git.kernel.org/...c/d3613770e2677683e65d062da5e31f48c409abe9

git.kernel.org/...c/6c6cec3db3b418c4fdf815731bc39e46dff75e1b

git.kernel.org/...c/6348d70af847b79805374fe628d3809a63fd7df3

git.kernel.org/...c/e00c3f71b5cf75681dbd74ee3f982a99cb690c2b

cve.org (CVE-2026-22990)

nvd.nist.gov (CVE-2026-22990)

Download JSON