Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

DEBIAN-CVE-2026-43407

In the Linux kernel, the following vulnerability has been resolved: libceph: Fix potential out-of-bounds access in ceph_handle_auth_reply() This patch fixes an out-of-bounds access in ceph_handle_au...
Back to all
CVE

DEBIAN-CVE-2026-43407

In the Linux kernel, the following vulnerability has been resolved: libceph: Fix potential out-of-bounds access in ceph_handle_auth_reply() This patch fixes an out-of-bounds access in ceph_handle_au...

In the Linux kernel, the following vulnerability has been resolved:  libceph: Fix potential out-of-bounds access in cephhandleauthreply()  This patch fixes an out-of-bounds access in cephhandleauthreply() that can be triggered by a message of type CEPHMSGAUTHREPLY. In cephhandleauthreply(), the value of the payloadlen field of such a message is stored in a variable of type int. A value greater than INTMAX leads to an integer overflow and is interpreted as a negative value. This leads to decrementing the pointer address by this value and subsequently accessing it because cephdecodeneed() only checks that the memory access does not exceed the end address of the allocation.  This patch fixes the issue by changing the data type of payloadlen to u32. Additionally, the data type of resultmsglen is changed to u32, as it is also a variable holding a non-negative length.  Also, an additional layer of sanity checks is introduced, ensuring that directly after reading it from the message, payloadlen and resultmsglen are not greater than the overall segment length.  BUG: KASAN: slab-out-of-bounds in cephhandleauthreply+0x642/0x7a0 [libceph] Read of size 4 at addr ffff88811404df14 by task kworker/20:1/262  CPU: 20 UID: 0 PID: 262 Comm: kworker/20:1 Not tainted 6.19.2 #5 PREEMPT(voluntary) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 Workqueue: ceph-msgr cephconworkfn [libceph] Call Trace:  <TASK>  dumpstacklvl+0x76/0xa0  printreport+0xd1/0x620  ? pfxrawspinlockirqsave+0x10/0x10  ? kasancompletemodereportinfo+0x72/0x210  kasanreport+0xe7/0x130  ? cephhandleauthreply+0x642/0x7a0 [libceph]  ? cephhandleauthreply+0x642/0x7a0 [libceph]  asanreportloadnnoabort+0xf/0x20  cephhandleauthreply+0x642/0x7a0 [libceph]  mondispatch+0x973/0x23d0 [libceph]  ? apparmorsocketrecvmsg+0x6b/0xa0  ? pfxmondispatch+0x10/0x10 [libceph]  ? kasancheckwrite+0x14/0x30i  ? mutexunlock+0x7f/0xd0  ? pfxmutexunlock+0x10/0x10  ? pfxdorecvmsg+0x10/0x10 [libceph]  cephconprocessmessage+0x1f1/0x650 [libceph]  processmessage+0x1e/0x450 [libceph]  cephconv2tryread+0x2e48/0x6c80 [libceph]  ? pfxcephconv2tryread+0x10/0x10 [libceph]  ? savefpregstofpstate+0xb0/0x230  ? rawspinrqunlock+0x17/0xa0  ? finishtaskswitch.isra.0+0x13b/0x760  ? switchto+0x385/0xda0  ? kasancheckwrite+0x14/0x30  ? mutexlock+0x8d/0xe0  ? pfxmutexlock+0x10/0x10  cephconworkfn+0x248/0x10c0 [libceph]  processonework+0x629/0xf80  ? kasancheckwrite+0x14/0x30  workerthread+0x87f/0x1570  ? pfxrawspinlockirqsave+0x10/0x10  ? pfxtrytowakeup+0x10/0x10  ? kasanprintaddressstackframe+0x1f7/0x280  ? pfxworkerthread+0x10/0x10  kthread+0x396/0x830  ? pfxrawspinlockirq+0x10/0x10  ? pfxkthread+0x10/0x10  ? kasancheckwrite+0x14/0x30  ? recalcsigpending+0x180/0x210  ? pfxkthread+0x10/0x10  retfromfork+0x3f7/0x610  ? pfxretfromfork+0x10/0x10  ? switchto+0x385/0xda0  ? _pfxkthread+0x10/0x10  retfromforkasm+0x1a/0x30  </TASK>  [ idryomov: replace if statements with cephdecodeneed() for   payloadlen and resultmsglen ]

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
-
C
H
U
0
-
3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
C
H
U
-

Related Resources

No items found.

References

https://security-tracker.debian.org/tracker/CVE-2026-43407

Severity

9.1

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
9.1
EPSS Probability
0%
EPSS Percentile
0%
Introduced Version
0
Fix Available
6.1.170-1,6.12.85-1,6.19.10-1

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading