Description
In the Linux kernel, the following vulnerability has been resolved:

libceph: define and enforce CEPH_MAX_KEY_LEN

When decoding the key, verify that the key material would fit into
a fixed-size buffer in process_auth_done() and generally has a sane
length.

The new CEPH_MAX_KEY_LEN check replaces the existing check for a key
with no key material which is a) not universal since CEPH_CRYPTO_NONE
has to be excluded and b) doesn't provide much value since a smaller
than needed key is just as invalid as no key -- this has to be handled
elsewhere anyway.
Published: 2026-05-08
Score: 7.0 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

In the Linux kernel, the absence of a ceiling on the length of Ceph keys can lead to improper buffer handling during authentication. This omission allows an attacker to supply a key whose material exceeds the fixed‑size buffer used in process_auth_done(), potentially causing memory corruption or denial of service. The unchecked length check represents a classic buffer overflow or improper input validation flaw. Because the vulnerability resides in kernel authentication code, an attacker would need to supply malicious input during Ceph authentication. The impact is local to the kernel process that handles authentication, and a successful exploitation could compromise confidentiality, integrity or availability of the affected system.

Affected Systems

The affected system is the Linux kernel. Version information is not specified in the CVE data; the flaw was addressed by a kernel patch that enforces CEPH_MAX_KEY_LEN, but the exact kernel releases that include the fix are not listed. Until a kernel containing this patch is deployed, Linux installations remain potentially vulnerable.

Risk and Exploitability

The CVSS score is 7.0 and the EPSS score is unavailable, indicating no known public exploits and the vulnerability is not listed in the CISA KEV catalog. Still, the weakness involves kernel authentication logic, meaning that an attacker would likely need to influence Ceph authentication traffic to the kernel, a limitation that reduces immediate exploitation risk but does not eliminate it. The potential for privilege escalation or kernel compromise makes the overall risk moderate to high for systems that use Ceph authentication without the patch.

Generated by OpenCVE AI on May 9, 2026 at 03:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Linux kernel update that includes the CEPH_MAX_KEY_LEN enforcement, such as the patch referenced by commit c1a0f5f1e5e7e98c36a362ec3d1fcfd9932931ed.
  • Configure Ceph to use key material that respects the maximum key length or temporarily disable Ceph authentication until the patch is applied.
  • Monitor Ceph authentication logs for failures or anomalies that could indicate attempts to use oversized keys.

Generated by OpenCVE AI on May 9, 2026 at 03:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 02:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120
CWE-20

Sat, 09 May 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1284
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Important


Fri, 08 May 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120
CWE-20

Fri, 08 May 2026 13:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: libceph: define and enforce CEPH_MAX_KEY_LEN When decoding the key, verify that the key material would fit into a fixed-size buffer in process_auth_done() and generally has a sane length. The new CEPH_MAX_KEY_LEN check replaces the existing check for a key with no key material which is a) not universal since CEPH_CRYPTO_NONE has to be excluded and b) doesn't provide much value since a smaller than needed key is just as invalid as no key -- this has to be handled elsewhere anyway.
Title libceph: define and enforce CEPH_MAX_KEY_LEN
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-09T04:10:17.378Z

Reserved: 2026-05-01T14:12:56.000Z

Link: CVE-2026-43304

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T14:16:37.693

Modified: 2026-05-08T14:16:37.693

Link: CVE-2026-43304

cve-icon Redhat

Severity : Important

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43304 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T04:00:14Z

Weaknesses