Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-22990
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-23 Jan, 2026 | 15:24
Updated At-09 Feb, 2026 | 08:36
Rejected At-
▼CVE Numbering Authority (CNA)
libceph: replace overzealous BUG_ON in osdmap_apply_incremental()

In the Linux kernel, the following vulnerability has been resolved: libceph: replace overzealous BUG_ON in osdmap_apply_incremental() If the osdmap is (maliciously) corrupted such that the incremental osdmap epoch is different from what is expected, there is no need to BUG. Instead, just declare the incremental osdmap to be invalid.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/ceph/osdmap.c
Default Status
unaffected
Versions
Affected
  • From f24e9980eb860d8600cbe5ef3d2fd9295320d229 before 9aa0b0c14cefece078286d78b97d4c09685e372d (git)
  • From f24e9980eb860d8600cbe5ef3d2fd9295320d229 before 4b106fbb1c7b841cd402abd83eb2447164c799ea (git)
  • From f24e9980eb860d8600cbe5ef3d2fd9295320d229 before 6afd2a4213524bc742b709599a3663aeaf77193c (git)
  • From f24e9980eb860d8600cbe5ef3d2fd9295320d229 before d3613770e2677683e65d062da5e31f48c409abe9 (git)
  • From f24e9980eb860d8600cbe5ef3d2fd9295320d229 before 6c6cec3db3b418c4fdf815731bc39e46dff75e1b (git)
  • From f24e9980eb860d8600cbe5ef3d2fd9295320d229 before 6348d70af847b79805374fe628d3809a63fd7df3 (git)
  • From f24e9980eb860d8600cbe5ef3d2fd9295320d229 before e00c3f71b5cf75681dbd74ee3f982a99cb690c2b (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/ceph/osdmap.c
Default Status
affected
Versions
Affected
  • 2.6.34
Unaffected
  • From 0 before 2.6.34 (semver)
  • From 5.10.248 through 5.10.* (semver)
  • From 5.15.198 through 5.15.* (semver)
  • From 6.1.161 through 6.1.* (semver)
  • From 6.6.121 through 6.6.* (semver)
  • From 6.12.66 through 6.12.* (semver)
  • From 6.18.6 through 6.18.* (semver)
  • From 6.19 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/9aa0b0c14cefece078286d78b97d4c09685e372d
N/A
https://git.kernel.org/stable/c/4b106fbb1c7b841cd402abd83eb2447164c799ea
N/A
https://git.kernel.org/stable/c/6afd2a4213524bc742b709599a3663aeaf77193c
N/A
https://git.kernel.org/stable/c/d3613770e2677683e65d062da5e31f48c409abe9
N/A
https://git.kernel.org/stable/c/6c6cec3db3b418c4fdf815731bc39e46dff75e1b
N/A
https://git.kernel.org/stable/c/6348d70af847b79805374fe628d3809a63fd7df3
N/A
https://git.kernel.org/stable/c/e00c3f71b5cf75681dbd74ee3f982a99cb690c2b
N/A
Hyperlink: https://git.kernel.org/stable/c/9aa0b0c14cefece078286d78b97d4c09685e372d
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/4b106fbb1c7b841cd402abd83eb2447164c799ea
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/6afd2a4213524bc742b709599a3663aeaf77193c
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d3613770e2677683e65d062da5e31f48c409abe9
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/6c6cec3db3b418c4fdf815731bc39e46dff75e1b
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/6348d70af847b79805374fe628d3809a63fd7df3
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/e00c3f71b5cf75681dbd74ee3f982a99cb690c2b
Resource: N/A
Details not found