From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 0678D3E277D for ; Fri, 8 May 2026 13:14:31 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778246072; cv=none; b=ZXSIkRsQDb8rndMVV+t3X3p+gaGrtIINkMvfh/8pWqANwf0qVT1iYLKnAfXqhvXCd/NUcENj+mwUExjGiyMisovlhLw6JPsiYYnuel8M9cRUvSyYi7ZvjqyCVdxNggsRA/PxAIpvU/JDSZjvZA3GS2w9U8sIZ5PoFSC0Y1yKaVo= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778246072; c=relaxed/simple; bh=zL1qKYp5ovy3iM7LHCd+oRpDMOAvOSpHMOJNemvjpb0=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=OzuOx9t1CCkaOBj/C8SiJJ/gy00ONNdHlPtDIcbv9vUzAGLNw7pnVaO/Z4WDLA4c0ISeJSMvXgOZTykFZMM5Y+DMSPAnJ0eSAhPLcYiDuhasrqHIjByXBNAmPJyW3rBiZecDqmtthELMn+pdIjzOIShBlRfaaWnstNptYeRGTu4= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=q7AaX1rk; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="q7AaX1rk" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 506EBC2BCB0; Fri, 8 May 2026 13:14:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1778246071; bh=zL1qKYp5ovy3iM7LHCd+oRpDMOAvOSpHMOJNemvjpb0=; h=From:To:Cc:Subject:Date:Reply-To:From; b=q7AaX1rkbsQburyv19lgx+v0l0C1O3aboXJpwKQsUQtUx6oV+0aIvPPz1/uutqzVb 0aLtbGT2nJsV174kHWFdStJJRJheGwzte5Kn/dLJbQNEhLF4pvPiQXV2kyR/mXDqne 5XG1yFwMyxy8osJ2sLOjHbxFEsKI/gGxvtvlrGsU= From: Greg Kroah-Hartman To: linux-cve-announce@vger.kernel.org Cc: Greg Kroah-Hartman Subject: CVE-2026-43304: libceph: define and enforce CEPH_MAX_KEY_LEN Date: Fri, 8 May 2026 15:12:09 +0200 Message-ID: <2026050857-CVE-2026-43304-a225@gregkh> X-Mailer: git-send-email 2.54.0 Reply-To: , Precedence: bulk X-Mailing-List: linux-cve-announce@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Developer-Signature: v=1; a=openpgp-sha256; l=2810; i=gregkh@linuxfoundation.org; h=from:subject:message-id; bh=Hvrv5hboEWN4mGiUuKniBT2AdpR39HCDaa3ZBAFUHBY=; b=owGbwMvMwCRo6H6F97bub03G02pJDJl/H8rG6nZ6ZNj6LTcMXLdruk/mF76Ak4XGH28t5Azc6 y7CvGxfRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAExkEivDgtbNB/793bwoYkOh ifQCyY/rH39cVc0wv079/L0OHX2e7V6TP/57Lcape6dVFgA= X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp; fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29 Content-Transfer-Encoding: 8bit From: Greg Kroah-Hartman Description =========== In the Linux kernel, the following vulnerability has been resolved: libceph: define and enforce CEPH_MAX_KEY_LEN When decoding the key, verify that the key material would fit into a fixed-size buffer in process_auth_done() and generally has a sane length. The new CEPH_MAX_KEY_LEN check replaces the existing check for a key with no key material which is a) not universal since CEPH_CRYPTO_NONE has to be excluded and b) doesn't provide much value since a smaller than needed key is just as invalid as no key -- this has to be handled elsewhere anyway. The Linux kernel CVE team has assigned CVE-2026-43304 to this issue. Affected and fixed versions =========================== Fixed in 5.15.202 with commit 6405e8c680974bb74e2c98d5249fb52c7b12a6c6 Fixed in 6.1.165 with commit 8d745d38c88ecbed95f6b2b39857bf89f35a3244 Fixed in 6.6.128 with commit e1dc45d97975f9db65694d234fbddf1915176e16 Fixed in 6.12.75 with commit 1b275bd49e58752efb83767a5d1aed41356c5e64 Fixed in 6.18.16 with commit c1a0f5f1e5e7e98c36a362ec3d1fcfd9932931ed Fixed in 6.19.6 with commit d82467c07b03a27c3c5469b62bb3b726305a80bb Fixed in 7.0 with commit ac431d597a9bdfc2ba6b314813f29a6ef2b4a3bf Please see https://www.kernel.org for a full list of currently supported kernel versions by the kernel community. Unaffected versions might change over time as fixes are backported to older supported kernel versions. The official CVE entry at https://cve.org/CVERecord/?id=CVE-2026-43304 will be updated if fixes are backported, please check that for the most up to date information about this issue. Affected files ============== The file(s) affected by this issue are: net/ceph/crypto.c net/ceph/crypto.h net/ceph/messenger_v2.c Mitigation ========== The Linux kernel CVE team recommends that you update to the latest stable kernel version for this, and many other bugfixes. Individual changes are never tested alone, but rather are part of a larger kernel release. Cherry-picking individual commits is not recommended or supported by the Linux kernel community at all. If however, updating to the latest release is impossible, the individual changes to resolve this issue can be found at these commits: https://git.kernel.org/stable/c/6405e8c680974bb74e2c98d5249fb52c7b12a6c6 https://git.kernel.org/stable/c/8d745d38c88ecbed95f6b2b39857bf89f35a3244 https://git.kernel.org/stable/c/e1dc45d97975f9db65694d234fbddf1915176e16 https://git.kernel.org/stable/c/1b275bd49e58752efb83767a5d1aed41356c5e64 https://git.kernel.org/stable/c/c1a0f5f1e5e7e98c36a362ec3d1fcfd9932931ed https://git.kernel.org/stable/c/d82467c07b03a27c3c5469b62bb3b726305a80bb https://git.kernel.org/stable/c/ac431d597a9bdfc2ba6b314813f29a6ef2b4a3bf