Home

Description

In the Linux kernel, the following vulnerability has been resolved: libceph: replace BUG_ON with bounds check for map->max_osd OSD indexes come from untrusted network packets. Boundary checks are added to validate these against map->max_osd. [ idryomov: drop BUG_ON in ceph_get_primary_affinity(), minor cosmetic edits ]

PUBLISHED Reserved 2025-12-16 | Published 2025-12-16 | Updated 2025-12-16 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 57f5fbae9f1024aba17ff75e00433324115c548a
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before becc488a4d864db338ebd4e313aa3c77da24b604
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before e67e3be690f5f7e3b031cf29e8d91e6d02a8e30d
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before b4368b7f97014e1015445d61abd0b27c4c6e8424
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before ec3797f043756a94ea2d0f106022e14ac4946c02
affected

Default status
affected

6.1.159 (semver)
unaffected

6.6.119 (semver)
unaffected

6.12.61 (semver)
unaffected

6.17.11 (semver)
unaffected

6.18 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/57f5fbae9f1024aba17ff75e00433324115c548a

git.kernel.org/...c/becc488a4d864db338ebd4e313aa3c77da24b604

git.kernel.org/...c/e67e3be690f5f7e3b031cf29e8d91e6d02a8e30d

git.kernel.org/...c/b4368b7f97014e1015445d61abd0b27c4c6e8424

git.kernel.org/...c/ec3797f043756a94ea2d0f106022e14ac4946c02

cve.org (CVE-2025-68283)

nvd.nist.gov (CVE-2025-68283)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.