CVE-2026-43188
Page Array Error Propagation in Linux Kernel CephFS
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ceph | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's Ceph filesystem when fscrypt is enabled. The function move_dirty_folio_in_page_array() may fail because it tries to allocate bounce buffers for encrypted folios using a non-blocking allocation mode (GFP_NOWAIT), which can commonly fail. However, the error handling in ceph_process_folio_batch() incorrectly propagates these allocation errors as batch errors due to improper resetting of the return code variable. This causes the main writeback loop to receive errors it cannot handle, potentially leading to a kernel oops (crash) when ceph_allocate_page_array() encounters an unexpected state.
The fix involves resetting the error code when redirtying the folio so that errors from move_dirty_folio_in_page_array() do not propagate and cause failures. This prevents the kernel from crashing due to these allocation errors during encrypted write operations in Ceph.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel oops) during write operations on Ceph filesystems with encryption enabled. Such crashes can lead to system instability, data loss, or service interruptions, especially in environments relying on Ceph for storage.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved by resetting the error code (rc) when redirtying the folio to prevent errors in move_dirty_folio_in_page_array() from propagating. This prevents the error from causing a kernel oops in ceph_allocate_page_array().
To mitigate this vulnerability, ensure your Linux kernel is updated to a version that includes this fix for the Ceph subsystem.