CVE-2026-22990 PUBLISHED

libceph: replace overzealous BUG_ON in osdmap_apply_incremental()

Assigner: Linux
Reserved: 13.01.2026 Published: 23.01.2026 Updated: 23.01.2026

In the Linux kernel, the following vulnerability has been resolved:

libceph: replace overzealous BUG_ON in osdmap_apply_incremental()

If the osdmap is (maliciously) corrupted such that the incremental osdmap epoch is different from what is expected, there is no need to BUG. Instead, just declare the incremental osdmap to be invalid.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 9aa0b0c14cefece078286d78b97d4c09685e372d (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 4b106fbb1c7b841cd402abd83eb2447164c799ea (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 6afd2a4213524bc742b709599a3663aeaf77193c (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to d3613770e2677683e65d062da5e31f48c409abe9 (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 6c6cec3db3b418c4fdf815731bc39e46dff75e1b (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 6348d70af847b79805374fe628d3809a63fd7df3 (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to e00c3f71b5cf75681dbd74ee3f982a99cb690c2b (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • unaffected from 5.10.248 to 5.10.* (incl.)
  • unaffected from 5.15.198 to 5.15.* (incl.)
  • unaffected from 6.1.161 to 6.1.* (incl.)
  • unaffected from 6.6.121 to 6.6.* (incl.)
  • unaffected from 6.12.66 to 6.12.* (incl.)
  • unaffected from 6.18.6 to 6.18.* (incl.)
  • unaffected from 6.19-rc5 to * (incl.)

References