CVE-2026-43406
Received Received - Intake
Out-of-Bounds Read in Linux Kernel Ceph Library

Publication date: 2026-05-08

Last updated on: 2026-05-08

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: libceph: prevent potential out-of-bounds reads in process_message_header() If the message frame is (maliciously) corrupted in a way that the length of the control segment ends up being less than the size of the message header or a different frame is made to look like a message frame, out-of-bounds reads may ensue in process_message_header(). Perform an explicit bounds check before decoding the message header.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-08
Last Modified
2026-05-08
Generated
2026-05-09
AI Q&A
2026-05-08
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's libceph component, specifically in the process_message_header() function.

If a message frame is maliciously corrupted so that the length of the control segment is less than the size of the message header, or if a different frame is made to appear like a message frame, it can cause out-of-bounds reads.

The vulnerability arises because process_message_header() does not perform an explicit bounds check before decoding the message header, which can lead to reading memory outside the intended bounds.


How can this vulnerability impact me? :

This vulnerability can lead to out-of-bounds reads in the Linux kernel, which may cause information disclosure or system instability.

An attacker could exploit this by sending a specially crafted message frame that triggers the out-of-bounds read, potentially exposing sensitive kernel memory or causing a crash.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart