Description
In the Linux kernel, the following vulnerability has been resolved: libceph: replace BUG_ON with bounds check for map->max_osd OSD indexes come from untrusted network packets. Boundary checks are added to validate these against map->max_osd. [ idryomov: drop BUG_ON in ceph_get_primary_affinity(), minor cosmetic edits ]
Product status
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 57f5fbae9f1024aba17ff75e00433324115c548a
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before becc488a4d864db338ebd4e313aa3c77da24b604
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before e67e3be690f5f7e3b031cf29e8d91e6d02a8e30d
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before b4368b7f97014e1015445d61abd0b27c4c6e8424
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before ec3797f043756a94ea2d0f106022e14ac4946c02
6.1.159 (semver)
6.6.119 (semver)
6.12.61 (semver)
6.17.11 (semver)
6.18 (original_commit_for_fix)
References
git.kernel.org/...c/57f5fbae9f1024aba17ff75e00433324115c548a
git.kernel.org/...c/becc488a4d864db338ebd4e313aa3c77da24b604
git.kernel.org/...c/e67e3be690f5f7e3b031cf29e8d91e6d02a8e30d
git.kernel.org/...c/b4368b7f97014e1015445d61abd0b27c4c6e8424
git.kernel.org/...c/ec3797f043756a94ea2d0f106022e14ac4946c02
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.