Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-4554

Опубликовано: 09 окт. 2008
Источник: redhat
EPSS Низкий

Описание

The do_splice_from function in fs/splice.c in the Linux kernel before 2.6.27 does not reject file descriptors that have the O_APPEND flag set, which allows local users to bypass append mode and make arbitrary changes to other locations in the file.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=466707kernel: don't allow splice() to files opened with O_APPEND

EPSS

Процентиль: 20%
0.00063
Низкий

Связанные уязвимости

ubuntu
почти 17 лет назад

The do_splice_from function in fs/splice.c in the Linux kernel before 2.6.27 does not reject file descriptors that have the O_APPEND flag set, which allows local users to bypass append mode and make arbitrary changes to other locations in the file.

nvd
почти 17 лет назад

The do_splice_from function in fs/splice.c in the Linux kernel before 2.6.27 does not reject file descriptors that have the O_APPEND flag set, which allows local users to bypass append mode and make arbitrary changes to other locations in the file.

debian
почти 17 лет назад

The do_splice_from function in fs/splice.c in the Linux kernel before ...

github
больше 3 лет назад

The do_splice_from function in fs/splice.c in the Linux kernel before 2.6.27 does not reject file descriptors that have the O_APPEND flag set, which allows local users to bypass append mode and make arbitrary changes to other locations in the file.

oracle-oval
больше 16 лет назад

ELSA-2008-1017: kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 20%
0.00063
Низкий