[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#280492: marked as done (kernel-source-2.4.27: strncpy does not 0-pad destination on some archs)



Your message dated Mon, 17 Jan 2005 15:07:03 +0900
with message-id <20050117060702.GA4511@verge.net.au>
and subject line kernel-source-2.4.27: strncpy does not 0-pad destination on some archs
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 9 Nov 2004 20:59:09 +0000
>From sf@sfritsch.de Tue Nov 09 12:59:09 2004
Return-path: <sf@sfritsch.de>
Received: from mail-out.m-online.net [212.18.0.9] 
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1CRd53-0003s1-00; Tue, 09 Nov 2004 12:59:09 -0800
Received: from svr14.m-online.net (mail.m-online.net [192.168.3.144])
	by mail-out.m-online.net (Postfix) with ESMTP id 2E9DC2A19;
	Tue,  9 Nov 2004 21:59:08 +0100 (CET)
Received: from k.local (ppp-82-135-5-239.mnet-online.de [82.135.5.239])
	by mail.m-online.net (Postfix) with ESMTP id 8EED11492A9;
	Tue,  9 Nov 2004 21:55:15 +0100 (CET)
Received: from stf by k.local with local (Exim 4.34)
	id 1CRd1G-0008Cg-7G; Tue, 09 Nov 2004 21:55:14 +0100
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Stefan Fritsch <sf@sfritsch.de>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: kernel-source-2.4.27: strncpy does not 0-pad destination on some archs
X-Mailer: reportbug 3.1
Date: Tue, 09 Nov 2004 21:55:14 +0100
Message-Id: <E1CRd1G-0008Cg-7G@k.local>
Sender: Stefan Fritsch <sf@sfritsch.de>
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
	autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Package: kernel-source-2.4.27
Version: 2.4.27-5
Severity: normal
Tags: security


This doesn't seem to be fixed in the debian 2.4.x kernels:

CAN-2003-0465:
The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the
buffer on architectures other than x86, as opposed to the expected
behavior of strncpy as implemented in libc, which could lead to
information leaks.

The generic .c version of strncpy is fixed in 2.6.x but not in 2.4.x .

The x86 and ppc32 specific asm versions are fixed, but alpha, s390x, ppc64,
m68k, mips, and s390 seem to be unfixed. (However, I don't really understand
these assembler versions. Maybe someone who does could also check the 2.6 asm
versions).

---------------------------------------
Received: (at 280492-done) by bugs.debian.org; 17 Jan 2005 06:08:19 +0000
>From horms@koto.vergenet.net Sun Jan 16 22:08:19 2005
Return-path: <horms@koto.vergenet.net>
Received: from koto.vergenet.net [210.128.90.7] 
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1CqQ3n-0001a3-00; Sun, 16 Jan 2005 22:08:19 -0800
Received: by koto.vergenet.net (Postfix, from userid 7100)
	id 36C773413A; Mon, 17 Jan 2005 14:49:23 +0900 (JST)
Date: Mon, 17 Jan 2005 15:07:03 +0900
From: Horms <horms@debian.org>
To: Stefan Fritsch <sf@sfritsch.de>
Cc: 280492-done@bugs.debian.org
Subject: Re: kernel-source-2.4.27: strncpy does not 0-pad destination on some archs
Message-ID: <20050117060702.GA4511@verge.net.au>
References: <E1CRd1G-0008Cg-7G@k.local>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <E1CRd1G-0008Cg-7G@k.local>
X-Cluestick: seven
User-Agent: Mutt/1.5.6+20040907i
Delivered-To: 280492-done@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no 
	version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Both 2.4 and 2.6 upstream do not NULL terminate dest
if count is exceeded. This is documented in the kernel
and appears to be quite intentional. I am closing this
accordingly.

-- 
Horms



Reply to: