CVE-2026-22990

In the Linux kernel, the following vulnerability has been resolved: libceph: replace overzealous BUG_ON in osdmap_apply_incremental() If the osdmap is (maliciously) corrupted such that the incremental osdmap epoch is different from what is expected, there is no need to BUG. Instead, just declare the incremental osdmap to be invalid.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*

History

26 Feb 2026, 17:22

Type Values Removed Values Added
CWE CWE-617
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/4b106fbb1c7b841cd402abd83eb2447164c799ea - () https://git.kernel.org/stable/c/4b106fbb1c7b841cd402abd83eb2447164c799ea - Patch
References () https://git.kernel.org/stable/c/6348d70af847b79805374fe628d3809a63fd7df3 - () https://git.kernel.org/stable/c/6348d70af847b79805374fe628d3809a63fd7df3 - Patch
References () https://git.kernel.org/stable/c/6afd2a4213524bc742b709599a3663aeaf77193c - () https://git.kernel.org/stable/c/6afd2a4213524bc742b709599a3663aeaf77193c - Patch
References () https://git.kernel.org/stable/c/6c6cec3db3b418c4fdf815731bc39e46dff75e1b - () https://git.kernel.org/stable/c/6c6cec3db3b418c4fdf815731bc39e46dff75e1b - Patch
References () https://git.kernel.org/stable/c/9aa0b0c14cefece078286d78b97d4c09685e372d - () https://git.kernel.org/stable/c/9aa0b0c14cefece078286d78b97d4c09685e372d - Patch
References () https://git.kernel.org/stable/c/d3613770e2677683e65d062da5e31f48c409abe9 - () https://git.kernel.org/stable/c/d3613770e2677683e65d062da5e31f48c409abe9 - Patch
References () https://git.kernel.org/stable/c/e00c3f71b5cf75681dbd74ee3f982a99cb690c2b - () https://git.kernel.org/stable/c/e00c3f71b5cf75681dbd74ee3f982a99cb690c2b - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:2.6.34:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc5:*:*:*:*:*:*

23 Jan 2026, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-23 16:15

Updated : 2026-02-26 17:22


NVD link : CVE-2026-22990

Mitre link : CVE-2026-22990

CVE.ORG link : CVE-2026-22990


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-617

Reachable Assertion