CVE-2026-43304
Received Received - Intake
Buffer Overflow in Linux Kernel Ceph

Publication date: 2026-05-08

Last updated on: 2026-05-08

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: libceph: define and enforce CEPH_MAX_KEY_LEN When decoding the key, verify that the key material would fit into a fixed-size buffer in process_auth_done() and generally has a sane length. The new CEPH_MAX_KEY_LEN check replaces the existing check for a key with no key material which is a) not universal since CEPH_CRYPTO_NONE has to be excluded and b) doesn't provide much value since a smaller than needed key is just as invalid as no key -- this has to be handled elsewhere anyway.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-08
Last Modified
2026-05-08
Generated
2026-05-09
AI Q&A
2026-05-08
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the Linux kernel's libceph component relates to how key material is handled during authentication. Previously, the system only checked if a key had no material, which was insufficient because some keys (like CEPH_CRYPTO_NONE) needed to be excluded and smaller-than-needed keys were not properly validated. The fix introduces a defined maximum key length (CEPH_MAX_KEY_LEN) and enforces that the key material fits into a fixed-size buffer and has a reasonable length during the decoding process in process_auth_done(). This prevents invalid or improperly sized keys from being accepted.


How can this vulnerability impact me? :

If this vulnerability were exploited, it could allow invalid or improperly sized keys to be processed, potentially leading to authentication issues or buffer overflows. This could compromise the security of the Ceph storage system by allowing unauthorized access or causing instability in the kernel module handling authentication.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart