Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-44466

Опубликовано: 29 сент. 2023
Источник: redhat
CVSS3: 8.8
EPSS Средний

Описание

An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.

An flaw was found in net/ceph/messenger_v2.c in the Linux Kernel. An integer signing error leads to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This issue occurs due to an untrusted length taken from a TCP packet in ceph_decode_32.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernel-rtAffected
Red Hat Enterprise Linux 9kernel-rtAffected
Red Hat Enterprise Linux 8kernelFixedRHSA-2023:524419.09.2023
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportkernelFixedRHSA-2023:496205.09.2023
Red Hat Enterprise Linux 8.4 Telecommunications Update ServicekernelFixedRHSA-2023:496205.09.2023
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionskernelFixedRHSA-2023:496205.09.2023
Red Hat Enterprise Linux 8.6 Extended Update SupportkernelFixedRHSA-2023:478929.08.2023

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=2241342kernel: buffer overflow in ceph file net/ceph/messenger_v2.c

EPSS

Процентиль: 94%
0.12308
Средний

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 1 года назад

An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.

CVSS3: 8.8
nvd
больше 1 года назад

An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.

CVSS3: 8.8
debian
больше 1 года назад

An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel ...

CVSS3: 8.8
github
больше 1 года назад

An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.

CVSS3: 8.8
fstec
почти 2 года назад

Уязвимость драйвера системы хранения данных Ceph (net/ceph/messenger_v2.c) ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

EPSS

Процентиль: 94%
0.12308
Средний

8.8 High

CVSS3