5.5
CVE-2026-22990
- EPSS 0.01%
- Veröffentlicht 23.01.2026 15:24:11
- Zuletzt bearbeitet 26.02.2026 17:22:52
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: libceph: replace overzealous BUG_ON in osdmap_apply_incremental() If the osdmap is (maliciously) corrupted such that the incremental osdmap epoch is different from what is expected, there is no need to BUG. Instead, just declare the incremental osdmap to be invalid.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version >= 2.6.34.1 < 5.10.248
Linux ≫ Linux Kernel Version >= 5.11 < 5.15.198
Linux ≫ Linux Kernel Version >= 5.16 < 6.1.161
Linux ≫ Linux Kernel Version >= 6.2 < 6.6.121
Linux ≫ Linux Kernel Version >= 6.7 < 6.12.66
Linux ≫ Linux Kernel Version >= 6.13 < 6.18.6
Linux ≫ Linux Kernel Version2.6.34 Update-
Linux ≫ Linux Kernel Version2.6.34 Updaterc2
Linux ≫ Linux Kernel Version2.6.34 Updaterc3
Linux ≫ Linux Kernel Version2.6.34 Updaterc4
Linux ≫ Linux Kernel Version2.6.34 Updaterc5
Linux ≫ Linux Kernel Version2.6.34 Updaterc6
Linux ≫ Linux Kernel Version2.6.34 Updaterc7
Linux ≫ Linux Kernel Version6.19 Updaterc1
Linux ≫ Linux Kernel Version6.19 Updaterc2
Linux ≫ Linux Kernel Version6.19 Updaterc3
Linux ≫ Linux Kernel Version6.19 Updaterc4
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.01% | 0.005 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
CWE-617 Reachable Assertion
The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.