Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-22984

Опубликовано: 23 янв. 2026
Источник: debian
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: libceph: prevent potential out-of-bounds reads in handle_auth_done() Perform an explicit bounds check on payload_len to avoid a possible out-of-bounds access in the callout. [ idryomov: changelog ]

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.18.8-1package
linuxnot-affectedbullseyepackage

Примечания

  • https://git.kernel.org/linus/818156caffbf55cb4d368f9c3cac64e458fb49c9 (6.19-rc5)

EPSS

Процентиль: 1%
0.00008
Низкий

Связанные уязвимости

CVSS3: 7.1
ubuntu
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: libceph: prevent potential out-of-bounds reads in handle_auth_done() Perform an explicit bounds check on payload_len to avoid a possible out-of-bounds access in the callout. [ idryomov: changelog ]

CVSS3: 7.1
redhat
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: libceph: prevent potential out-of-bounds reads in handle_auth_done() Perform an explicit bounds check on payload_len to avoid a possible out-of-bounds access in the callout. [ idryomov: changelog ]

CVSS3: 7.1
nvd
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: libceph: prevent potential out-of-bounds reads in handle_auth_done() Perform an explicit bounds check on payload_len to avoid a possible out-of-bounds access in the callout. [ idryomov: changelog ]

CVSS3: 7.1
msrc
27 дней назад

libceph: prevent potential out-of-bounds reads in handle_auth_done()

CVSS3: 7.1
github
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: libceph: prevent potential out-of-bounds reads in handle_auth_done() Perform an explicit bounds check on payload_len to avoid a possible out-of-bounds access in the callout. [ idryomov: changelog ]

EPSS

Процентиль: 1%
0.00008
Низкий