An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
USN-6416-1 | Linux kernel vulnerabilities |
![]() |
USN-6416-2 | Linux kernel vulnerabilities |
![]() |
USN-6416-3 | Linux kernel (Raspberry Pi) vulnerabilities |
![]() |
USN-6445-1 | Linux kernel (Intel IoTG) vulnerabilities |
![]() |
USN-6445-2 | Linux kernel (Intel IoTG) vulnerabilities |
![]() |
USN-6464-1 | Linux kernel vulnerabilities |
![]() |
USN-6466-1 | Linux kernel (NVIDIA) vulnerabilities |
![]() |
USN-6520-1 | Linux kernel (StarFive) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T20:07:33.225Z
Reserved: 2023-09-29T00:00:00
Link: CVE-2023-44466

No data.

Status : Analyzed
Published: 2023-09-29T06:15:11.007
Modified: 2025-05-23T20:49:33.517
Link: CVE-2023-44466


No data.