vendor:
Kernel
by:
cliph
7.5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: Kernel
Affected Version From: 2.2.x/2.4.x
Affected Version To: 2.2.x/2.4.x
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2002
Linux kernel d_path proof-of-concept exploit
The Linux kernel d_path() function converts a dentry structure into an ASCII path name. The full path to the specified dentry is returned in a fixed length buffer of size PAGE_SIZE bytes. Reportedly, if a dentry structure is passed with a path which would exceed this length, an erroneous value is returned. The path which is returned has leading entries truncated, and no error is reported.
Mitigation:
Ensure that the dentry structure is not passed with a path which would exceed the fixed length buffer size.