
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-44466 is a vulnerability discovered in the Linux kernel's Ceph file system messenger protocol implementation (net/ceph/messenger_v2.c) before version 6.4.5. The vulnerability stems from an integer signedness error that occurs during the processing of HELLO or AUTH frames before authentication is completed (NVD, Ubuntu). The issue was discovered by Thelford Williams and was publicly disclosed on September 29, 2023 (Kernel Patch).
The vulnerability exists in the net/ceph/messengerv2.c file where cephframedesc::fdlens is implemented as an int array. The decodepreamble() function performs an implicit cast from u32 to int, but the segment length checks are written as if handling unsigned values. When processing HELLO or AUTH frames before authentication completion, the arithmetic in headonwirelen() can be manipulated by a negative ctrllen to produce a headlen value that is less than CEPHPREAMBLELEN but still positive. This leads to a buffer overflow in prepareread_control() as the preamble gets copied to an undersized buffer (Google Security Research). The vulnerability has been assigned a CVSS v3.1 base score of 8.8 (HIGH) with vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NetApp Advisory).
The successful exploitation of this vulnerability could lead to buffer overflow and remote code execution via HELLO or AUTH frames. The impact includes potential disclosure of sensitive information, addition or modification of data, or Denial of Service (DoS). The vulnerability is particularly serious as it can be exploited before authentication is completed (NetApp Advisory).
The vulnerability has been fixed in Linux kernel version 6.4.5 and later. The fix involves hardening the msgr2.1 frame segment length checks by adding proper validation of segment lengths and ensuring they cannot be negative. The patch was committed by Ilya Dryomov and reviewed by Xiubo Li (Kernel Patch). Users are advised to upgrade to a patched version of the Linux kernel.
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."