CVE-2025-68285
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ceph | ceph | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free issue in the Linux kernel's Ceph client code, specifically in the function have_mon_and_osd_map(). It occurs because the code accesses pointers to monmap and osdmap structures without holding the necessary locks, allowing a race condition where these maps can be freed and replaced while still being accessed. This leads to dereferencing freed memory, which can cause crashes or undefined behavior. The fix involves rewriting the wait loop to properly acquire locks before accessing these maps and improving timeout handling.
How can this vulnerability impact me? :
This vulnerability can lead to use-after-free memory errors in the Ceph client, potentially causing system crashes, instability, or denial of service when mounting or interacting with Ceph filesystems. Exploiting this race condition could disrupt normal operation of systems relying on Ceph storage.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch or update to a Linux kernel version that includes the fix for the use-after-free vulnerability in libceph's have_mon_and_osd_map() function. Ensure that the wait loop in __ceph_open_session() is rewritten to properly take client->monc.mutex and client->osdc.lock when checking the map conditions, and that timeout handling is improved as described. Additionally, verify that monmap_show() and osdmap_show() functions take the respective locks before accessing the maps to prevent race conditions.