Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-22984
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-23 Jan, 2026 | 15:24
Updated At-09 Feb, 2026 | 08:36
Rejected At-
▼CVE Numbering Authority (CNA)
libceph: prevent potential out-of-bounds reads in handle_auth_done()

In the Linux kernel, the following vulnerability has been resolved: libceph: prevent potential out-of-bounds reads in handle_auth_done() Perform an explicit bounds check on payload_len to avoid a possible out-of-bounds access in the callout. [ idryomov: changelog ]

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/ceph/messenger_v2.c
Default Status
unaffected
Versions
Affected
  • From cd1a677cad994021b19665ed476aea63f5d54f31 before 194cfe2af4d2a1de599d39dad636b47c2f6c2c96 (git)
  • From cd1a677cad994021b19665ed476aea63f5d54f31 before 79fe3511db416d2f2edcfd93569807cb02736e5e (git)
  • From cd1a677cad994021b19665ed476aea63f5d54f31 before ef208ea331ef688729f64089b895ed1b49e842e3 (git)
  • From cd1a677cad994021b19665ed476aea63f5d54f31 before 2802ef3380fa8c4a08cda51ec1f085b1a712e9e2 (git)
  • From cd1a677cad994021b19665ed476aea63f5d54f31 before 2d653bb63d598ae4b096dd678744bdcc34ee89e8 (git)
  • From cd1a677cad994021b19665ed476aea63f5d54f31 before 818156caffbf55cb4d368f9c3cac64e458fb49c9 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/ceph/messenger_v2.c
Default Status
affected
Versions
Affected
  • 5.11
Unaffected
  • From 0 before 5.11 (semver)
  • From 5.15.198 through 5.15.* (semver)
  • From 6.1.161 through 6.1.* (semver)
  • From 6.6.121 through 6.6.* (semver)
  • From 6.12.66 through 6.12.* (semver)
  • From 6.18.6 through 6.18.* (semver)
  • From 6.19 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/194cfe2af4d2a1de599d39dad636b47c2f6c2c96
N/A
https://git.kernel.org/stable/c/79fe3511db416d2f2edcfd93569807cb02736e5e
N/A
https://git.kernel.org/stable/c/ef208ea331ef688729f64089b895ed1b49e842e3
N/A
https://git.kernel.org/stable/c/2802ef3380fa8c4a08cda51ec1f085b1a712e9e2
N/A
https://git.kernel.org/stable/c/2d653bb63d598ae4b096dd678744bdcc34ee89e8
N/A
https://git.kernel.org/stable/c/818156caffbf55cb4d368f9c3cac64e458fb49c9
N/A
Hyperlink: https://git.kernel.org/stable/c/194cfe2af4d2a1de599d39dad636b47c2f6c2c96
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/79fe3511db416d2f2edcfd93569807cb02736e5e
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/ef208ea331ef688729f64089b895ed1b49e842e3
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/2802ef3380fa8c4a08cda51ec1f085b1a712e9e2
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/2d653bb63d598ae4b096dd678744bdcc34ee89e8
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/818156caffbf55cb4d368f9c3cac64e458fb49c9
Resource: N/A
Details not found