CVE-2023-52618

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/03/2024
Last modified:
04/04/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> block/rnbd-srv: Check for unlikely string overflow<br /> <br /> Since "dev_search_path" can technically be as large as PATH_MAX,<br /> there was a risk of truncation when copying it and a second string<br /> into "full_path" since it was also PATH_MAX sized. The W=1 builds were<br /> reporting this warning:<br /> <br /> drivers/block/rnbd/rnbd-srv.c: In function &amp;#39;process_msg_open.isra&amp;#39;:<br /> drivers/block/rnbd/rnbd-srv.c:616:51: warning: &amp;#39;%s&amp;#39; directive output may be truncated writing up to 254 bytes into a region of size between 0 and 4095 [-Wformat-truncation=]<br /> 616 | snprintf(full_path, PATH_MAX, "%s/%s",<br /> | ^~<br /> In function &amp;#39;rnbd_srv_get_full_path&amp;#39;,<br /> inlined from &amp;#39;process_msg_open.isra&amp;#39; at drivers/block/rnbd/rnbd-srv.c:721:14: drivers/block/rnbd/rnbd-srv.c:616:17: note: &amp;#39;snprintf&amp;#39; output between 2 and 4351 bytes into a destination of size 4096<br /> 616 | snprintf(full_path, PATH_MAX, "%s/%s",<br /> | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br /> 617 | dev_search_path, dev_name);<br /> | ~~~~~~~~~~~~~~~~~~~~~~~~~~<br /> <br /> To fix this, unconditionally check for truncation (as was already done<br /> for the case where "%SESSNAME%" was present).

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.8 (including) 5.10.210 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.149 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.77 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.16 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.7.4 (excluding)
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*