In the Linux kernel, the following vulnerability has been resolved:
libceph: replace BUG_ON with bounds check for map->max_osd
OSD indexes come from untrusted network packets. Boundary checks are
added to validate these against map->max_osd.
[ idryomov: drop BUG_ON in ceph_get_primary_affinity(), minor cosmetic
edits ]
Metrics
Affected Vendors & Products
References
History
Tue, 16 Dec 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: libceph: replace BUG_ON with bounds check for map->max_osd OSD indexes come from untrusted network packets. Boundary checks are added to validate these against map->max_osd. [ idryomov: drop BUG_ON in ceph_get_primary_affinity(), minor cosmetic edits ] | |
| Title | libceph: replace BUG_ON with bounds check for map->max_osd | |
| First Time appeared |
Linux
Linux linux Kernel |
|
| CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Linux
Linux linux Kernel |
|
| References |
|
|
Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-12-16T15:06:05.355Z
Reserved: 2025-12-16T14:48:05.291Z
Link: CVE-2025-68283
No data.
Status : Received
Published: 2025-12-16T16:16:07.080
Modified: 2025-12-16T16:16:07.080
Link: CVE-2025-68283
No data.
OpenCVE Enrichment
No data.