libceph: prevent potential out-of-bounds reads in handle_auth_done()
Summary
| CVE | CVE-2026-22984 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-01-23 16:15:54 UTC |
| Updated | 2026-04-27 14:16:27 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: libceph: prevent potential out-of-bounds reads in handle_auth_done() Perform an explicit bounds check on payload_len to avoid a possible out-of-bounds access in the callout. [ idryomov: changelog ] |
Risk And Classification
Primary CVSS: v3.1 7.1 HIGH from [email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Problem Types: CWE-125
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 7.1 | HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H |
| 3.1 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Secondary | 9.8 | CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| 3.1 | CNA | DECLARED | 9.8 | CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
NoneAvailability
HighCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Linux | Linux Kernel | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected cd1a677cad994021b19665ed476aea63f5d54f31 194cfe2af4d2a1de599d39dad636b47c2f6c2c96 git | Not specified |
| CNA | Linux | Linux | affected cd1a677cad994021b19665ed476aea63f5d54f31 79fe3511db416d2f2edcfd93569807cb02736e5e git | Not specified |
| CNA | Linux | Linux | affected cd1a677cad994021b19665ed476aea63f5d54f31 ef208ea331ef688729f64089b895ed1b49e842e3 git | Not specified |
| CNA | Linux | Linux | affected cd1a677cad994021b19665ed476aea63f5d54f31 2802ef3380fa8c4a08cda51ec1f085b1a712e9e2 git | Not specified |
| CNA | Linux | Linux | affected cd1a677cad994021b19665ed476aea63f5d54f31 2d653bb63d598ae4b096dd678744bdcc34ee89e8 git | Not specified |
| CNA | Linux | Linux | affected cd1a677cad994021b19665ed476aea63f5d54f31 818156caffbf55cb4d368f9c3cac64e458fb49c9 git | Not specified |
| CNA | Linux | Linux | affected 5.11 | Not specified |
| CNA | Linux | Linux | unaffected 5.11 semver | Not specified |
| CNA | Linux | Linux | unaffected 5.15.198 5.15.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.161 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.121 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.66 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.6 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/818156caffbf55cb4d368f9c3cac64e458fb49c9 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/2802ef3380fa8c4a08cda51ec1f085b1a712e9e2 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/ef208ea331ef688729f64089b895ed1b49e842e3 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/194cfe2af4d2a1de599d39dad636b47c2f6c2c96 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/79fe3511db416d2f2edcfd93569807cb02736e5e | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/2d653bb63d598ae4b096dd678744bdcc34ee89e8 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.