Description
In the Linux kernel, the following vulnerability has been resolved: ceph: give up on paths longer than PATH_MAX If the full path to be built by ceph_mdsc_build_path() happens to be longer than PATH_MAX, then this function will enter an endless (retry) loop, effectively blocking the whole task. Most of the machine becomes unusable, making this a very simple and effective DoS vulnerability. I cannot imagine why this retry was ever implemented, but it seems rather useless and harmful to me. Let's remove it and fail with ENAMETOOLONG instead.
References (8)
Scores
CVSS v3
5.5
EPSS
0.0001
EPSS Percentile
0.7%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-835
Status
published
Products (8)
linux/Kernel
2.6.34 - 5.10.234linux
linux/Kernel
5.11.0 - 5.15.177linux
linux/Kernel
5.16.0 - 6.1.125linux
linux/Kernel
6.2.0 - 6.6.70linux
linux/Kernel
6.7.0 - 6.12.7linux
linux/linux_kernel
2.6.34 (7 CPE variants)
linux/linux_kernel
6.13 rc1 (3 CPE variants)
linux/linux_kernel
2.6.35 - 5.10.234
Published
Jan 11, 2025
Tracked Since
Feb 18, 2026