Skip to content

Commit 20e8d74

Browse files
Update Advisory-EGI-SVG-2026-02.md
1 parent f227bd5 commit 20e8d74

File tree

1 file changed

+92
-3
lines changed

1 file changed

+92
-3
lines changed

2026/Advisory-EGI-SVG-2026-02.md

Lines changed: 92 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,100 @@
11
---
22
title: Advisory-EGI-SVG-2026-02
33
permalink: /Advisory-EGI-SVG-2026-02
4+
redirect_from:
5+
- /Advisory-SVG-CVE-2025-68285
46

57
---
8+
## Advisory-EGI-SVG-2026-02
69

7-
**Advisory EGI-SVG-2026-02 is not public yet**
10+
# HIGH risk Ceph client Vulnerability in Linux kernel
811

9-
When it is it will be here.
12+
Date: 2026-01-21
13+
Updated: 2026-02-25
1014

11-
You are looking in the right place
15+
A HIGH risk use-after-free vulnerability was found in the Ceph client
16+
session initialization in the Linux kernel. This may lead to privilege
17+
escalation.
18+
19+
20+
## IDs AND CVSS SCORE
21+
22+
EGI SVG ID : EGI-SVG-2026-02
23+
24+
CVE ID : CVE-2025-68285
25+
26+
CVSS Score : 7.0 [R 1]
27+
28+
29+
## ACTIONS REQUIRED/RECOMMENDED
30+
31+
Sites are recommended to update relevant components as soon as possible
32+
using information in the references below.
33+
34+
Sites should be aware that if a public exploit is released which allows
35+
easy root access in the EGI infrastructure this vulnerability is likely
36+
to be elevated to 'Critical' and sites will then be required to patch or
37+
have mitigation in place within 7 days or risk suspension.
38+
39+
40+
## MORE INFORMATION
41+
42+
This vulnerability is difficult to expoit because of the complexity
43+
of the attack. However, the use-after-free vulnerability might lead to
44+
privilege escalation, which elevates the risk. RedHat's initial
45+
assessment of 'IMPORTANT' severity, usually implies at least HIGH risk
46+
for EGI sites, although it appears to have been downgraded to 'Moderate'
47+
48+
## STATUS OF THIS ADVISORY
49+
50+
_TLP:CLEAR information - Unlimited distribution_
51+
52+
https://advisories.egi.eu/Advisory-EGI-SVG-2026-02
53+
54+
https://advisories.egi.eu/Advisory-SVG-CVE-2025-68285
55+
56+
Minor updates may be made without re-distribution to the sites.
57+
58+
59+
## CONTACT AND OTHER INFORMATION ON SVG
60+
61+
-----------------------------
62+
This advisory is subject to the Creative Commons licence
63+
https://creativecommons.org/licenses/by/4.0/ and
64+
the EGI (https://www.egi.eu/) Software Vulnerability Group
65+
must be credited.
66+
-----------------------------
67+
68+
Comments or questions should be sent to
69+
svg-rat at mailman.egi.eu
70+
71+
Vulnerabilities relevant for EGI can be reported at
72+
report-vulnerability at egi.eu
73+
74+
(see [R 99] for further details, and other information on SVG)
75+
76+
77+
## REFERENCES
78+
79+
- [R 1] <https://access.redhat.com/security/cve/CVE-2025-68285>
80+
81+
- [R 2] <https://www.cve.org/CVERecord?id=CVE-2025-68285>
82+
83+
- [R 3] <https://nvd.nist.gov/vuln/detail/CVE-2025-68285>
84+
85+
- [R 4] <https://security-tracker.debian.org/tracker/CVE-2025-68285>
86+
87+
- [R 5] <https://ubuntu.com/security/CVE-2025-68285>
88+
89+
- [R 6] <https://errata.build.resf.org/> (RockyLinux)
90+
91+
- [R 7] <https://errata.almalinux.org/> (AlmaLinux)
92+
93+
94+
- [R 99] <https://confluence.egi.eu/display/EGIBG/SVG+Advisories>
95+
96+
## CREDITS
97+
98+
SVG was alerted to this vulnerability by Mischa Salle
99+
100+

0 commit comments

Comments
 (0)