In the Linux kernel, the following vulnerability has been resolved: ceph: give up on paths longer than PATH_MAX If the full path to be built by ceph_mdsc_build_path() happens to be longer than PATH_MAX, then this function will enter an endless (retry) loop, effectively blocking the whole task. Most of the machine becomes unusable, making this a very simple and effective DoS vulnerability. I cannot imagine why this retry was ever implemented, but it seems rather useless and harmful to me. Let's remove it and fail with ENAMETOOLONG instead.
History

Tue, 14 Jan 2025 08:45:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Sat, 11 Jan 2025 12:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: ceph: give up on paths longer than PATH_MAX If the full path to be built by ceph_mdsc_build_path() happens to be longer than PATH_MAX, then this function will enter an endless (retry) loop, effectively blocking the whole task. Most of the machine becomes unusable, making this a very simple and effective DoS vulnerability. I cannot imagine why this retry was ever implemented, but it seems rather useless and harmful to me. Let's remove it and fail with ENAMETOOLONG instead.
Title ceph: give up on paths longer than PATH_MAX
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2025-01-11T12:35:40.252Z

Updated: 2025-01-11T12:35:40.252Z

Reserved: 2025-01-11T12:34:02.558Z

Link: CVE-2024-53685

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-01-11T13:15:25.997

Modified: 2025-01-11T13:15:25.997

Link: CVE-2024-53685

cve-icon Redhat

Severity : Low

Publid Date: 2025-01-11T00:00:00Z

Links: CVE-2024-53685 - Bugzilla