CVE-2023-52618
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/03/2024
Last modified:
04/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
block/rnbd-srv: Check for unlikely string overflow<br />
<br />
Since "dev_search_path" can technically be as large as PATH_MAX,<br />
there was a risk of truncation when copying it and a second string<br />
into "full_path" since it was also PATH_MAX sized. The W=1 builds were<br />
reporting this warning:<br />
<br />
drivers/block/rnbd/rnbd-srv.c: In function &#39;process_msg_open.isra&#39;:<br />
drivers/block/rnbd/rnbd-srv.c:616:51: warning: &#39;%s&#39; directive output may be truncated writing up to 254 bytes into a region of size between 0 and 4095 [-Wformat-truncation=]<br />
616 | snprintf(full_path, PATH_MAX, "%s/%s",<br />
| ^~<br />
In function &#39;rnbd_srv_get_full_path&#39;,<br />
inlined from &#39;process_msg_open.isra&#39; at drivers/block/rnbd/rnbd-srv.c:721:14: drivers/block/rnbd/rnbd-srv.c:616:17: note: &#39;snprintf&#39; output between 2 and 4351 bytes into a destination of size 4096<br />
616 | snprintf(full_path, PATH_MAX, "%s/%s",<br />
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br />
617 | dev_search_path, dev_name);<br />
| ~~~~~~~~~~~~~~~~~~~~~~~~~~<br />
<br />
To fix this, unconditionally check for truncation (as was already done<br />
for the case where "%SESSNAME%" was present).
Impact
Base Score 3.x
5.30
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.8 (including) | 5.10.210 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.149 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.77 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.16 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.7.4 (excluding) |
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/5b9ea86e662035a886ccb5c76d56793cba618827
- https://git.kernel.org/stable/c/95bc866c11974d3e4a9d922275ea8127ff809cf7
- https://git.kernel.org/stable/c/9e4bf6a08d1e127bcc4bd72557f2dfafc6bc7f41
- https://git.kernel.org/stable/c/a2c6206f18104fba7f887bf4dbbfe4c41adc4339
- https://git.kernel.org/stable/c/af7bbdac89739e2e7380387fda598848d3b7010f
- https://git.kernel.org/stable/c/f6abd5e17da33eba15df2bddc93413e76c2b55f7
- https://git.kernel.org/stable/c/5b9ea86e662035a886ccb5c76d56793cba618827
- https://git.kernel.org/stable/c/95bc866c11974d3e4a9d922275ea8127ff809cf7
- https://git.kernel.org/stable/c/9e4bf6a08d1e127bcc4bd72557f2dfafc6bc7f41
- https://git.kernel.org/stable/c/a2c6206f18104fba7f887bf4dbbfe4c41adc4339
- https://git.kernel.org/stable/c/af7bbdac89739e2e7380387fda598848d3b7010f
- https://git.kernel.org/stable/c/f6abd5e17da33eba15df2bddc93413e76c2b55f7
- https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html