CVE-2025-68283
Published: December 17, 2025Last modified: December 17, 2025
Description
In the Linux kernel, the following vulnerability has been resolved: libceph: replace BUG_ON with bounds check for map->max_osd OSD indexes come from untrusted network packets. Boundary checks are added to validate these against map->max_osd. [ idryomov: drop BUG_ON in ceph_get_primary_affinity(), minor cosmetic edits ]
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | linux-lts | Fixed (6.1.159-r0) |
| 25 LTS | linux-lts | Fixed (6.12.61-r0) | |
| Stream | linux-lts | Fixed (6.12.61-r0) |
References
- https://git.kernel.org/stable/c/57f5fbae9f1024aba17ff75e00433324115c548a
- https://git.kernel.org/stable/c/b4368b7f97014e1015445d61abd0b27c4c6e8424
- https://git.kernel.org/stable/c/becc488a4d864db338ebd4e313aa3c77da24b604
- https://git.kernel.org/stable/c/e67e3be690f5f7e3b031cf29e8d91e6d02a8e30d
- https://git.kernel.org/stable/c/ec3797f043756a94ea2d0f106022e14ac4946c02