CVE-2025-68283
Description
In the Linux kernel, the following vulnerability has been resolved:
libceph: replace BUG_ON with bounds check for map->max_osd
OSD indexes come from untrusted network packets. Boundary checks are added to validate these against map->max_osd.
[ idryomov: drop BUG_ON in ceph_get_primary_affinity(), minor cosmetic edits ]
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In libceph, OSD indexes from untrusted network packets could trigger a BUG_ON crash; replaced with proper bounds check against map->max_osd.
Vulnerability
CVE-2025-68283 is a vulnerability in the Linux kernel's Ceph filesystem client library (libceph). The root cause is that OSD (Object Storage Device) index values received in network packets were not validated before being used in certain code paths. The kernel code contained a BUG_ON statement that assumed these indices were always valid, but since they originate from untrusted network sources, an attacker could supply a crafted packet with an out-of-bounds OSD index.
Exploitation
An attacker who can send malicious Ceph network messages to a system running an affected kernel can trigger the BUG_ON by providing an OSD index that exceeds map->max_osd. This requires the ability to communicate with the Ceph client, but no authentication is mentioned as a prerequisite; the input is simply parsed from the network without validation.
Impact
A successful exploit results in a kernel panic, leading to a denial of service (DoS) on the affected system. No privilege escalation or data compromise is described. The vulnerability is reachable without authentication if the attacker can send packets to the Ceph client.
Mitigation
The fix replaces the BUG_ON with a proper bounds check, gracefully handling out-of-range OSD indices. The patch also includes adjustments to ceph_get_primary_affinity() and minor cosmetic cleanup [1]. The fix is included in the stable kernel tree [2]. Users should update to a patched kernel version.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- git.kernel.org/stable/c/57f5fbae9f1024aba17ff75e00433324115c548anvd
- git.kernel.org/stable/c/b4368b7f97014e1015445d61abd0b27c4c6e8424nvd
- git.kernel.org/stable/c/becc488a4d864db338ebd4e313aa3c77da24b604nvd
- git.kernel.org/stable/c/e67e3be690f5f7e3b031cf29e8d91e6d02a8e30dnvd
- git.kernel.org/stable/c/ec3797f043756a94ea2d0f106022e14ac4946c02nvd
News mentions
0No linked articles in our index yet.