Description
In the Linux kernel, the following vulnerability has been resolved: libceph: prevent potential out-of-bounds reads in process_message_header() If the message frame is (maliciously) corrupted in a way that the length of the control segment ends up being less than the size of the message header or a different frame is made to look like a message frame, out-of-bounds reads may ensue in process_message_header(). Perform an explicit bounds check before decoding the message header.
INFO
Published Date :
2026-05-08T14:21:46.246Z
Last Modified :
2026-05-08T14:21:46.246Z
Source :
Linux
AFFECTED PRODUCTS
The following products are affected by CVE-2026-43406 vulnerability.
| Vendors | Products |
|---|---|
| Linux |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-43406.