CVE-2023-44466
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2023-44466 is a vulnerability discovered in the Linux kernel's Ceph file system messenger protocol implementation (net/ceph/messenger_v2.c) before version 6.4.5. The vulnerability stems from an integer signedness error that occurs during the processing of HELLO or AUTH frames before authentication is completed (NVD, Ubuntu). The issue was discovered by Thelford Williams and was publicly disclosed on September 29, 2023 (Kernel Patch).

Technical details

The vulnerability exists in the net/ceph/messengerv2.c file where cephframedesc::fdlens is implemented as an int array. The decodepreamble() function performs an implicit cast from u32 to int, but the segment length checks are written as if handling unsigned values. When processing HELLO or AUTH frames before authentication completion, the arithmetic in headonwirelen() can be manipulated by a negative ctrllen to produce a headlen value that is less than CEPHPREAMBLELEN but still positive. This leads to a buffer overflow in prepareread_control() as the preamble gets copied to an undersized buffer (Google Security Research). The vulnerability has been assigned a CVSS v3.1 base score of 8.8 (HIGH) with vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NetApp Advisory).

Impact

The successful exploitation of this vulnerability could lead to buffer overflow and remote code execution via HELLO or AUTH frames. The impact includes potential disclosure of sensitive information, addition or modification of data, or Denial of Service (DoS). The vulnerability is particularly serious as it can be exploited before authentication is completed (NetApp Advisory).

Mitigation and workarounds

The vulnerability has been fixed in Linux kernel version 6.4.5 and later. The fix involves hardening the msgr2.1 frame segment length checks by adding proper validation of segment lengths and ensuring they cannot be negative. The patch was committed by Ilya Dryomov and reviewed by Xiubo Li (Kernel Patch). Users are advised to upgrade to a patched version of the Linux kernel.

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40258HIGH7
  • Linux KernelLinux Kernel
  • kernel-rt-64k-debug-devel-matched
NoNoDec 04, 2025
CVE-2025-40259MEDIUM6.2
  • Linux KernelLinux Kernel
  • kernel-rt-64k
NoNoDec 04, 2025
CVE-2025-40264MEDIUM5.5
  • Linux KernelLinux Kernel
  • kernel-64k-modules-extra
NoNoDec 04, 2025
CVE-2025-40254MEDIUM5.5
  • Linux KernelLinux Kernel
  • kernel-64k-devel-matched
NoNoDec 04, 2025
CVE-2025-40253MEDIUM5.5
  • Linux KernelLinux Kernel
  • kernel-64k-debug-modules-partner
NoNoDec 04, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management