{"id":"CVE-2023-52748","summary":"f2fs: avoid format-overflow warning","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: avoid format-overflow warning\n\nWith gcc and W=1 option, there's a warning like this:\n\nfs/f2fs/compress.c: In function ‘f2fs_init_page_array_cache’:\nfs/f2fs/compress.c:1984:47: error: ‘%u’ directive writing between\n1 and 7 bytes into a region of size between 5 and 8\n[-Werror=format-overflow=]\n 1984 |  sprintf(slab_name, \"f2fs_page_array_entry-%u:%u\", MAJOR(dev),\n\t\tMINOR(dev));\n      |                                               ^~\n\nString \"f2fs_page_array_entry-%u:%u\" can up to 35. The first \"%u\" can up\nto 4 and the second \"%u\" can up to 7, so total size is \"24 + 4 + 7 = 35\".\nslab_name's size should be 35 rather than 32.","modified":"2026-04-11T12:46:35.406372Z","published":"2024-05-21T15:30:38.229Z","database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52748.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/3eebe636cac53886bd5d1cdd55e082ec9e84983f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/526dd7540a09ecf87b5f54f3ab4e0a2528f25a79"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6fca08fd3085253b48fcb1bd243a0a5e18821a00"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c041f5ddef00c731c541e00bc8ae97b8c84c682f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e0d4e8acb3789c5a8651061fbab62ca24a45c063"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e4088d7d8f1123006d46a42edf51b8c960a58ef9"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52748.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52748"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"31083031709eea6530f0551d59eecdb2e68265ef"},{"fixed":"c041f5ddef00c731c541e00bc8ae97b8c84c682f"},{"fixed":"e4088d7d8f1123006d46a42edf51b8c960a58ef9"},{"fixed":"526dd7540a09ecf87b5f54f3ab4e0a2528f25a79"},{"fixed":"6fca08fd3085253b48fcb1bd243a0a5e18821a00"},{"fixed":"3eebe636cac53886bd5d1cdd55e082ec9e84983f"},{"fixed":"e0d4e8acb3789c5a8651061fbab62ca24a45c063"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52748.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.10.0"},{"fixed":"5.10.202"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.140"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.64"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.5.13"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.6.0"},{"fixed":"6.6.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52748.json"}}],"schema_version":"1.7.5"}