LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-43407

CVE-2026-43407 - Vulnerability Analysis

CriticalCVSS: 9.1

Last Updated: May 11, 2026

Linux kernel libceph - Out-of-Bounds Read/Write

Published: May 8, 2026Updated: May 11, 2026Remote Exploitable

Overview

Linux kernel libceph contains an out-of-bounds access caused by integer overflow in ceph_handle_auth_reply() due to improper payload_len handling, letting attackers trigger memory corruption, exploit requires crafted CEPH_MSG_AUTH_REPLY message.

Severity & Score

Severity: Critical
CVSS Score: 9.1

Impact

Attackers can cause out-of-bounds memory access leading to potential memory corruption or denial of service.

Mitigation

Update to the latest Linux kernel version containing the patch fixing ceph_handle_auth_reply()

Details

CVE ID
CVE-2026-43407
Severity
Critical
CVSS Score
9.1
Type
out_of_bounds_rw
Status
new

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H