An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-6416-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6416-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6416-3 | Linux kernel (Raspberry Pi) vulnerabilities |
Ubuntu USN |
USN-6445-1 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6445-2 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6464-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6466-1 | Linux kernel (NVIDIA) vulnerabilities |
Ubuntu USN |
USN-6520-1 | Linux kernel (StarFive) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T20:07:33.225Z
Reserved: 2023-09-29T00:00:00
Link: CVE-2023-44466
No data.
Status : Analyzed
Published: 2023-09-29T06:15:11.007
Modified: 2025-05-23T20:49:33.517
Link: CVE-2023-44466
OpenCVE Enrichment
No data.
Ubuntu USN