[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#280492: kernel-source-2.4.27: strncpy does not 0-pad destination on some archs



Package: kernel-source-2.4.27
Version: 2.4.27-5
Severity: normal
Tags: security


This doesn't seem to be fixed in the debian 2.4.x kernels:

CAN-2003-0465:
The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the
buffer on architectures other than x86, as opposed to the expected
behavior of strncpy as implemented in libc, which could lead to
information leaks.

The generic .c version of strncpy is fixed in 2.6.x but not in 2.4.x .

The x86 and ppc32 specific asm versions are fixed, but alpha, s390x, ppc64,
m68k, mips, and s390 seem to be unfixed. (However, I don't really understand
these assembler versions. Maybe someone who does could also check the 2.6 asm
versions).



Reply to: