CVE-2025-68297
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ceph | ceph | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a crash issue in the Linux kernel's Ceph filesystem component, specifically in the process_v2_sparse_read() function when handling fscrypt-encrypted directories. It occurs under the Ceph msgr2 protocol in secure mode and can be triggered by performing certain operations on encrypted directories, leading to a kernel crash (general protection fault).
How can this vulnerability impact me? :
The vulnerability can cause the Linux kernel to crash when accessing fscrypt-encrypted directories on Ceph filesystems using the msgr2 protocol in secure mode. This crash can lead to denial of service, potentially disrupting system availability and operations relying on Ceph storage with encrypted directories.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring system logs for kernel crash messages related to Ceph, specifically looking for warnings or oops messages involving process_v2_sparse_read() or ceph_con_v2_try_read in the kernel logs. You can use commands such as 'dmesg | grep ceph' or 'journalctl -k | grep ceph' to check for relevant crash or warning messages indicating the issue.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include avoiding the use of Ceph msgr2 protocol in secure mode with fscrypt-encrypted directories until a patched kernel version is applied. Applying the kernel update that fixes the crash in process_v2_sparse_read() is the recommended action. Additionally, refrain from performing operations that trigger the vulnerability, such as mounting Ceph with secure ms_mode and accessing encrypted directories as described in the reproduction steps.