Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2002-0499
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The d_path function in Linux kernel 2.2.20 and earlier, and 2.4.18 and earlier, truncates long pathnames without generating an error, which could allow local users to force programs to perform inappropriate operations on the wrong directories.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux内核函数d_path()路径截断漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux内核函数d_path()根据dentry结构生成一个ASCII形式的绝对路径。 问题在于生成的绝对路径被存放在一个固定长度(PAGE_SIZE)的缓冲区中。如果dentry结构对应的路径长度超过(PAGE_SIZE - 1),d_path()先截断路径后保存之,但没有报告这个错误。 getcwd(2)、readlink(2)等系统调用使用到d_path()函数,这会导致返回的绝对路径不是你所期望的那个,带来潜在的安全问题。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2002-0499
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2002-0499
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2002-0499

No comments yet


Leave a comment