An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.
Advisories
Source ID Title
Ubuntu USN Ubuntu USN USN-6416-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6416-2 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6416-3 Linux kernel (Raspberry Pi) vulnerabilities
Ubuntu USN Ubuntu USN USN-6445-1 Linux kernel (Intel IoTG) vulnerabilities
Ubuntu USN Ubuntu USN USN-6445-2 Linux kernel (Intel IoTG) vulnerabilities
Ubuntu USN Ubuntu USN USN-6464-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6466-1 Linux kernel (NVIDIA) vulnerabilities
Ubuntu USN Ubuntu USN USN-6520-1 Linux kernel (StarFive) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-02T20:07:33.225Z

Reserved: 2023-09-29T00:00:00

Link: CVE-2023-44466

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2023-09-29T06:15:11.007

Modified: 2025-05-23T20:49:33.517

Link: CVE-2023-44466

cve-icon Redhat

Severity : Important

Publid Date: 2023-09-29T00:00:00Z

Links: CVE-2023-44466 - Bugzilla

cve-icon OpenCVE Enrichment

No data.