CVE-2026-43406
EUVD-2026-2871208.05.2026, 15:16
In the Linux kernel, the following vulnerability has been resolved: libceph: prevent potential out-of-bounds reads in process_message_header() If the message frame is (maliciously) corrupted in a way that the length of the control segment ends up being less than the size of the message header or a different frame is made to look like a message frame, out-of-bounds reads may ensue in process_message_header(). Perform an explicit bounds check before decoding the message header.Enginsight
Awaiting analysis
This vulnerability is currently awaiting analysis.
Debian Releases
References