{"id":"CVE-2026-22990","summary":"libceph: replace overzealous BUG_ON in osdmap_apply_incremental()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: replace overzealous BUG_ON in osdmap_apply_incremental()\n\nIf the osdmap is (maliciously) corrupted such that the incremental\nosdmap epoch is different from what is expected, there is no need to\nBUG.  Instead, just declare the incremental osdmap to be invalid.","modified":"2026-04-02T13:11:40.772221Z","published":"2026-01-23T15:24:11.332Z","related":["SUSE-SU-2026:0447-1","SUSE-SU-2026:0472-1","SUSE-SU-2026:0587-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20555-1","SUSE-SU-2026:20599-1","SUSE-SU-2026:20615-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","openSUSE-SU-2026:20287-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/22xxx/CVE-2026-22990.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/4b106fbb1c7b841cd402abd83eb2447164c799ea"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6348d70af847b79805374fe628d3809a63fd7df3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6afd2a4213524bc742b709599a3663aeaf77193c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6c6cec3db3b418c4fdf815731bc39e46dff75e1b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9aa0b0c14cefece078286d78b97d4c09685e372d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d3613770e2677683e65d062da5e31f48c409abe9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e00c3f71b5cf75681dbd74ee3f982a99cb690c2b"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/22xxx/CVE-2026-22990.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-22990"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"f24e9980eb860d8600cbe5ef3d2fd9295320d229"},{"fixed":"9aa0b0c14cefece078286d78b97d4c09685e372d"},{"fixed":"4b106fbb1c7b841cd402abd83eb2447164c799ea"},{"fixed":"6afd2a4213524bc742b709599a3663aeaf77193c"},{"fixed":"d3613770e2677683e65d062da5e31f48c409abe9"},{"fixed":"6c6cec3db3b418c4fdf815731bc39e46dff75e1b"},{"fixed":"6348d70af847b79805374fe628d3809a63fd7df3"},{"fixed":"e00c3f71b5cf75681dbd74ee3f982a99cb690c2b"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-22990.json"}}],"schema_version":"1.7.5"}