Lyrie
Critical CVE
CVSS 9.83 sources verified·1 min read
By Lyrie Threat Intelligence·4/27/2026

CRITICAL: CVE-2026-22984 (CVSS 9.8) — linux linux kernel

CVE: CVE-2026-22984

CVSS: 9.8 (3.1) — CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: CRITICAL

Status: Critical advisory

Affected

  • linux linux kernel

Summary

In the Linux kernel, the following vulnerability has been resolved:

libceph: prevent potential out-of-bounds reads in handle_auth_done()

Perform an explicit bounds check on payload_len to avoid a possible

out-of-bounds access in the callout.

[ idryomov: changelog ]

Verified Sources

References

  • https://git.kernel.org/stable/c/194cfe2af4d2a1de599d39dad636b47c2f6c2c96
  • https://git.kernel.org/stable/c/2802ef3380fa8c4a08cda51ec1f085b1a712e9e2
  • https://git.kernel.org/stable/c/2d653bb63d598ae4b096dd678744bdcc34ee89e8
  • https://git.kernel.org/stable/c/79fe3511db416d2f2edcfd93569807cb02736e5e
  • https://git.kernel.org/stable/c/818156caffbf55cb4d368f9c3cac64e458fb49c9
  • https://git.kernel.org/stable/c/ef208ea331ef688729f64089b895ed1b49e842e3

_Validated by the Lyrie Threat Intelligence Pipeline — 3 independent sources confirmed before publication. No speculation._

Lyrie Verdict

A vulnerability of this severity is exactly what Lyrie's anti-rogue-AI defense is built for: continuous, autonomous monitoring that doesn't wait for human reaction time.

Validated sources

  1. [1]NVD
  2. [2]GitHub Advisory
  3. [3]MITRE