PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-43304 Git CVE debrief

CVE-2026-43304 affects the Linux kernel's libceph path for decoding authentication key material. The fix adds an explicit CEPH_MAX_KEY_LEN check so decoded key data must fit the fixed-size buffer used by process_auth_done(), replacing a weaker check that only rejected empty key material. NVD rates the issue Critical (CVSS 9.8) with network access, no privileges, and no user interaction.

Vendor
Git
Product
Unknown
CVSS
CRITICAL 9.8
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-08
Original CVE updated
2026-05-11
Advisory published
2026-05-08
Advisory updated
2026-05-11

Who should care

Administrators and platform teams running Linux systems that use the kernel Ceph client/libceph, especially storage, virtualization, and cloud environments. Kernel maintainers, distro security teams, and operators of Ceph-backed mounts or clustered storage should prioritize it.

Technical summary

The vulnerable code path decodes a Ceph auth key and previously did not enforce a clear maximum length against the fixed-size buffer used later in process_auth_done(). The patch defines CEPH_MAX_KEY_LEN and validates decoded key material early, so oversized or otherwise malformed input is rejected before it can reach that buffer. In defensive terms, this is a bounds-checking fix in kernel auth parsing for libceph.

Defensive priority

Immediate

Recommended defensive actions

  • Apply the kernel updates or distribution backports that include the CEPH_MAX_KEY_LEN enforcement fix.
  • Prioritize systems that use the kernel Ceph client/libceph for mounted Ceph file systems or clustered storage.
  • Verify you are tracking your distribution's patched kernel build, not only upstream version numbers.
  • Schedule reboots into the fixed kernel where required by your patching process.
  • Review kernel and Ceph-related logs for authentication decoding errors after rollout.
  • If kernel Ceph client support is not needed on a host, disable or remove it to reduce exposure.

Evidence notes

This debrief is based only on the supplied CVE record, the NVD detail, and the official git.kernel.org references listed by NVD. The source text states that libceph now defines and enforces CEPH_MAX_KEY_LEN when decoding the key and that this replaces a prior check for no key material; no exploit steps, affected-version list, or additional impact details were provided in the corpus. Timing context uses the CVE published date of 2026-05-08 and modified date of 2026-05-11.

Official resources

Public disclosure context: the CVE record was published on 2026-05-08 and modified on 2026-05-11. This debrief uses those timestamps and the official links provided in the source corpus.