Description
An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-6416-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6416-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6416-3 | Linux kernel (Raspberry Pi) vulnerabilities |
Ubuntu USN |
USN-6445-1 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6445-2 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6464-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6466-1 | Linux kernel (NVIDIA) vulnerabilities |
Ubuntu USN |
USN-6520-1 | Linux kernel (StarFive) vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T20:07:33.225Z
Reserved: 2023-09-29T00:00:00.000Z
Link: CVE-2023-44466
No data.
Status : Analyzed
Published: 2023-09-29T06:15:11.007
Modified: 2025-05-23T20:49:33.517
Link: CVE-2023-44466
OpenCVE Enrichment
No data.
Ubuntu USN