{"vulnerability": "CVE-2023-44466", "sightings": [{"uuid": "d7e987fc-66f7-41b5-b07a-bdd1a946c0ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44466", "type": "seen", "source": "https://t.me/cibsecurity/71262", "content": "\u203c CVE-2023-44466 \u203c\n\nAn issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-29T12:37:40.000000Z"}]}