Description
An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.
Published: 2023-09-29
Score: 8.8 High
EPSS: 13.2% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Ubuntu USN Ubuntu USN USN-6416-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6416-2 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6416-3 Linux kernel (Raspberry Pi) vulnerabilities
Ubuntu USN Ubuntu USN USN-6445-1 Linux kernel (Intel IoTG) vulnerabilities
Ubuntu USN Ubuntu USN USN-6445-2 Linux kernel (Intel IoTG) vulnerabilities
Ubuntu USN Ubuntu USN USN-6464-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6466-1 Linux kernel (NVIDIA) vulnerabilities
Ubuntu USN Ubuntu USN USN-6520-1 Linux kernel (StarFive) vulnerabilities
History

No history.

Subscriptions

Linux Linux Kernel
Redhat Enterprise Linux Rhel Aus Rhel E4s Rhel Eus Rhel Tus Rhev Hypervisor
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-02T20:07:33.225Z

Reserved: 2023-09-29T00:00:00.000Z

Link: CVE-2023-44466

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2023-09-29T06:15:11.007

Modified: 2025-05-23T20:49:33.517

Link: CVE-2023-44466

cve-icon Redhat

Severity : Important

Publid Date: 2023-09-29T00:00:00Z

Links: CVE-2023-44466 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses