CVE-2026-43273
EUVD-2026-2767006.05.2026, 12:16
In the Linux kernel, the following vulnerability has been resolved: ceph: supply snapshot context in ceph_zero_partial_object() The ceph_zero_partial_object function was missing proper snapshot context for its OSD write operations, which could lead to data inconsistencies in snapshots. Reproducer: ../src/vstart.sh --new -x --localhost --bluestore ./bin/ceph auth caps client.fs_a mds 'allow rwps fsname=a' mon 'allow r fsname=a' osd 'allow rw tag cephfs data=a' mount -t ceph fs_a@.a=/ /mnt/mycephfs/ -o conf=./ceph.conf dd if=/dev/urandom of=/mnt/mycephfs/foo bs=64K count=1 mkdir /mnt/mycephfs/.snap/snap1 md5sum /mnt/mycephfs/.snap/snap1/foo fallocate -p -o 0 -l 4096 /mnt/mycephfs/foo echo 3 > /proc/sys/vm/drop/caches md5sum /mnt/mycephfs/.snap/snap1/foo # get different md5sum!!Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 3.12 ≤ 𝑥 < 5.10.252 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.202 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 6.1.165 |
| linux | linux_kernel | 6.2 ≤ 𝑥 < 6.6.128 |
| linux | linux_kernel | 6.7 ≤ 𝑥 < 6.12.75 |
| linux | linux_kernel | 6.13 ≤ 𝑥 < 6.18.16 |
| linux | linux_kernel | 6.19 ≤ 𝑥 < 6.19.6 |
𝑥
= Vulnerable software versions
Debian Releases
Vulnerability Media Exposure
References