CVE-2025-71116
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
14/01/2026
Last modified:
14/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
libceph: make decode_pool() more resilient against corrupted osdmaps<br />
<br />
If the osdmap is (maliciously) corrupted such that the encoded length<br />
of ceph_pg_pool envelope is less than what is expected for a particular<br />
encoding version, out-of-bounds reads may ensue because the only bounds<br />
check that is there is based on that length value.<br />
<br />
This patch adds explicit bounds checks for each field that is decoded<br />
or skipped.
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2acb8517429ab42146c6c0ac1daed1f03d2fd125
- https://git.kernel.org/stable/c/5d0d8c292531fe356c4e94dcfdf7d7212aca9957
- https://git.kernel.org/stable/c/8c738512714e8c0aa18f8a10c072d5b01c83db39
- https://git.kernel.org/stable/c/c82e39ff67353a5a6cbc07b786b8690bd2c45aaa
- https://git.kernel.org/stable/c/e927ab132b87ba3f076705fc2684d94b24201ed1



