Description
In the Linux kernel, the following vulnerability has been resolved:

ceph: fix memory leaks in ceph_mdsc_build_path()

Add __putname() calls to error code paths that did not free the "path"
pointer obtained by __getname(). If ownership of this pointer is not
passed to the caller via path_info.path, the function must free it
before returning.
Published: 2026-05-08
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Based on the description, it is inferred that the vulnerability stems from a memory leak in the ceph client’s ceph_mdsc_build_path() function. On error paths the function fails to free a path pointer returned by __getname(), allowing memory to accumulate. If an attacker can trigger these error conditions repeatedly, the kernel can consume excessive memory, potentially leading to a crash or degraded performance. The weakness is an improper resource handling issue (CWE-772). Severity lies in the potential for denial of service rather than direct code execution.

Affected Systems

Based on the description, it is inferred that the defect resides in the Linux kernel’s ceph client module. Any kernel version that incorporates the ceph client and has not yet applied the patch is affected. Based on the description, it is inferred that no explicit version range is provided, so all kernels with ceph support likely contain the issue until the fix is applied.

Risk and Exploitability

Based on the description, it is inferred that the EPSS score is not published and the vulnerability is not listed in the CISA KEV catalog, suggesting that documented exploitation remains low at present. The CVSS score is 5.5, indicating a medium severity. However, because the flaw can be triggered by sending ceph requests that provoke an error code path, it is inferred that an attacker with network access to a Ceph‑enabled server could potentially induce memory exhaustion. Without the patch, the risk is moderate to high, especially in environments with high ceph traffic or where resource limits are not enforced.

Generated by OpenCVE AI on May 9, 2026 at 04:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that includes the ceph_mdsc_build_path() memory‑leak fix.
  • Disable or restrict ceph client support on servers where the module is not required.
  • Enforce kernel memory limits or cgroup quotas to contain any accidental memory growth.
  • Monitor kernel memory usage and Ceph error logs for signs of repeated failures that may indicate exploitation attempts.

Generated by OpenCVE AI on May 9, 2026 at 04:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 03:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Sat, 09 May 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-772
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Fri, 08 May 2026 17:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: ceph: fix memory leaks in ceph_mdsc_build_path() Add __putname() calls to error code paths that did not free the "path" pointer obtained by __getname(). If ownership of this pointer is not passed to the caller via path_info.path, the function must free it before returning.
Title ceph: fix memory leaks in ceph_mdsc_build_path()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T14:21:55.037Z

Reserved: 2026-05-01T14:12:56.008Z

Link: CVE-2026-43419

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:53.910

Modified: 2026-05-08T15:16:53.910

Link: CVE-2026-43419

cve-icon Redhat

Severity : Low

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43419 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T04:30:17Z

Weaknesses