In the Linux kernel, the following vulnerability has been resolved:
ceph: give up on paths longer than PATH_MAX
If the full path to be built by ceph_mdsc_build_path() happens to be
longer than PATH_MAX, then this function will enter an endless (retry)
loop, effectively blocking the whole task.  Most of the machine
becomes unusable, making this a very simple and effective DoS
vulnerability.
I cannot imagine why this retry was ever implemented, but it seems
rather useless and harmful to me.  Let's remove it and fail with
ENAMETOOLONG instead.
                
            Metrics
Affected Vendors & Products
References
        History
                    Mon, 03 Nov 2025 21:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
         | 
Wed, 15 Oct 2025 21:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-835 | |
| CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.34:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.34:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.34:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.34:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.34:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.34:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.34:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*  | 
Thu, 13 Feb 2025 01:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-400 | 
Sun, 02 Feb 2025 10:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
         | 
Thu, 23 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
         | 
Fri, 17 Jan 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
         | 
Tue, 14 Jan 2025 08:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
         | |
| Metrics | 
        
        
        threat_severity
         
  | 
    
        
        cvssV3_1
         
 
  | 
Sat, 11 Jan 2025 12:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: ceph: give up on paths longer than PATH_MAX If the full path to be built by ceph_mdsc_build_path() happens to be longer than PATH_MAX, then this function will enter an endless (retry) loop, effectively blocking the whole task. Most of the machine becomes unusable, making this a very simple and effective DoS vulnerability. I cannot imagine why this retry was ever implemented, but it seems rather useless and harmful to me. Let's remove it and fail with ENAMETOOLONG instead. | |
| Title | ceph: give up on paths longer than PATH_MAX | |
| References | 
         | 
Status: PUBLISHED
Assigner: Linux
Published: 2025-01-11T12:35:40.252Z
Updated: 2025-11-03T20:48:20.745Z
Reserved: 2025-01-11T12:34:02.558Z
Link: CVE-2024-53685
No data.
Status : Modified
Published: 2025-01-11T13:15:25.997
Modified: 2025-11-03T21:17:46.893
Link: CVE-2024-53685