CVE-2025-68283
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's libceph component involved the use of BUG_ON, which is a kernel debugging macro, instead of proper boundary checks for the map->max_osd value. Since OSD indexes come from untrusted network packets, the lack of boundary checks could lead to improper handling of these indexes. The fix replaced BUG_ON with explicit boundary checks to validate OSD indexes against map->max_osd, preventing potential issues caused by invalid or malicious input.
How can this vulnerability impact me? :
Because OSD indexes are derived from untrusted network packets, the absence of proper boundary checks could allow malformed or malicious packets to trigger kernel bugs or crashes, potentially leading to denial of service or other stability issues in systems using the affected Linux kernel version.