In the Linux kernel, the following vulnerability has been resolved:
ceph: give up on paths longer than PATH_MAX
If the full path to be built by ceph_mdsc_build_path() happens to be
longer than PATH_MAX, then this function will enter an endless (retry)
loop, effectively blocking the whole task. Most of the machine
becomes unusable, making this a very simple and effective DoS
vulnerability.
I cannot imagine why this retry was ever implemented, but it seems
rather useless and harmful to me. Let's remove it and fail with
ENAMETOOLONG instead.
Metrics
Affected Vendors & Products
References
History
Tue, 14 Jan 2025 08:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Sat, 11 Jan 2025 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: ceph: give up on paths longer than PATH_MAX If the full path to be built by ceph_mdsc_build_path() happens to be longer than PATH_MAX, then this function will enter an endless (retry) loop, effectively blocking the whole task. Most of the machine becomes unusable, making this a very simple and effective DoS vulnerability. I cannot imagine why this retry was ever implemented, but it seems rather useless and harmful to me. Let's remove it and fail with ENAMETOOLONG instead. | |
Title | ceph: give up on paths longer than PATH_MAX | |
References |
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2025-01-11T12:35:40.252Z
Updated: 2025-01-11T12:35:40.252Z
Reserved: 2025-01-11T12:34:02.558Z
Link: CVE-2024-53685
Vulnrichment
No data.
NVD
Status : Received
Published: 2025-01-11T13:15:25.997
Modified: 2025-01-11T13:15:25.997
Link: CVE-2024-53685
Redhat