VYPR
Critical severity9.8NVD Advisory· Published May 8, 2026· Updated May 15, 2026

CVE-2026-43304

CVE-2026-43304

Description

In the Linux kernel, the following vulnerability has been resolved:

libceph: define and enforce CEPH_MAX_KEY_LEN

When decoding the key, verify that the key material would fit into a fixed-size buffer in process_auth_done() and generally has a sane length.

The new CEPH_MAX_KEY_LEN check replaces the existing check for a key with no key material which is a) not universal since CEPH_CRYPTO_NONE has to be excluded and b) doesn't provide much value since a smaller than needed key is just as invalid as no key -- this has to be handled elsewhere anyway.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A missing maximum key length check in libceph's key decoding can cause a heap buffer overflow, leading to potential remote code execution in the Linux kernel.

Vulnerability

CVE-2026-43304 is a critical vulnerability in the Linux kernel's Ceph filesystem client (libceph). The issue arises in the process_auth_done() function when decoding authentication keys. Previously, the kernel only checked for keys with no material, but did not enforce an upper bound on key length. By defining and enforcing CEPH_MAX_KEY_LEN, the patch ensures that key material fits into a fixed-size buffer, preventing a buffer overflow. [1]

Exploitation

An attacker can exploit this vulnerability by sending a crafted authentication response containing an excessively long key to a vulnerable system running the Ceph client. No authentication is required to trigger the overflow; the attack can be performed remotely over the network. The attacker only needs to be able to send malicious Ceph protocol messages, which typically requires network access to the target host. [1]

Impact

Successful exploitation allows an attacker to overflow the fixed-size key buffer, potentially leading to memory corruption. This can result in arbitrary code execution with kernel privileges, complete system compromise, or denial of service. Given the critical CVSS score of 9.8, the vulnerability is considered easily exploitable and of high severity. [1]

Mitigation

The fix was committed to the Linux kernel stable tree as commit 1b275bd49e58752efb83767a5d1aed41356c5e64. Users are strongly advised to update their kernel to a version containing this patch. No workarounds are known, and the CVE is not listed as exploited in the wild (KEV) as of the publication date. [1]

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.