| Summary | In the Linux kernel, the following vulnerability has been resolved: libceph: prevent potential out-of-bounds reads in process_message_header() If the message frame is (maliciously) corrupted in a way that the Perform an explicit bounds check before decoding the message header. |
|---|---|
| Publication Date | May 9, 2026, 12:16 a.m. |
| Registration Date | May 9, 2026, 4:14 a.m. |
| Last Update | May 9, 2026, 12:16 a.m. |