First published: Fri Sep 29 2023(Updated: )
An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <6.4.5 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.6-1 6.12.9-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-44466.
The severity of CVE-2023-44466 is high with a score of 8.8.
You can find more information about CVE-2023-44466 at the following links: [link1](https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a282a2f10539dce2aa619e71e1817570d557fc97), [link2](https://github.com/google/security-research/security/advisories/GHSA-jg27-jx6w-xwph), [link3](https://github.com/torvalds/linux/commit/a282a2f10539dce2aa619e71e1817570d557fc97).
CVE-2023-44466 occurs due to an integer signedness error in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames.
To fix CVE-2023-44466, it is recommended to update to Linux kernel version 6.4.5 or later.