CVSS 9.83 sources verified·1 min read
By Lyrie Threat Intelligence·4/27/2026
CRITICAL: CVE-2026-22984 (CVSS 9.8) — linux linux kernel
CVE: CVE-2026-22984
CVSS: 9.8 (3.1) — CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: CRITICAL
Status: Critical advisory
Affected
- linux linux kernel
Summary
In the Linux kernel, the following vulnerability has been resolved:
libceph: prevent potential out-of-bounds reads in handle_auth_done()
Perform an explicit bounds check on payload_len to avoid a possible
out-of-bounds access in the callout.
[ idryomov: changelog ]
Verified Sources
References
- https://git.kernel.org/stable/c/194cfe2af4d2a1de599d39dad636b47c2f6c2c96
- https://git.kernel.org/stable/c/2802ef3380fa8c4a08cda51ec1f085b1a712e9e2
- https://git.kernel.org/stable/c/2d653bb63d598ae4b096dd678744bdcc34ee89e8
- https://git.kernel.org/stable/c/79fe3511db416d2f2edcfd93569807cb02736e5e
- https://git.kernel.org/stable/c/818156caffbf55cb4d368f9c3cac64e458fb49c9
- https://git.kernel.org/stable/c/ef208ea331ef688729f64089b895ed1b49e842e3
_Validated by the Lyrie Threat Intelligence Pipeline — 3 independent sources confirmed before publication. No speculation._
Lyrie Verdict
A vulnerability of this severity is exactly what Lyrie's anti-rogue-AI defense is built for: continuous, autonomous monitoring that doesn't wait for human reaction time.
Validated sources
- [1]NVD
- [2]GitHub Advisory
- [3]MITRE