CVE-2026-43407
Out-of-Bounds Access in Linux Kernel Ceph Module
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's libceph component, specifically in the function ceph_handle_auth_reply(). It involves a potential out-of-bounds memory access triggered by a message of type CEPH_MSG_AUTH_REPLY.
The issue arises because the payload_len field from the message is stored in an int variable. If payload_len is greater than INT_MAX, it causes an integer overflow, making the value appear negative. This negative value leads to incorrect pointer arithmetic, causing the program to access memory outside the intended bounds.
The vulnerability is fixed by changing the data types of payload_len and result_msg_len to unsigned 32-bit integers (u32) and adding sanity checks to ensure these lengths do not exceed the overall segment length.
How can this vulnerability impact me? :
This vulnerability can lead to out-of-bounds memory access in the Linux kernel's libceph component. Such memory access issues can cause system instability, crashes, or potentially allow an attacker to execute arbitrary code or cause denial of service.