Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2003-0465

Опубликовано: 18 авг. 2003
Источник: debian
EPSS Низкий

Описание

The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the buffer on architectures other than x86, as opposed to the expected behavior of strncpy as implemented in libc, which could lead to information leaks.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6not-affectedpackage
kernel-source-2.4.27fixed2.4.27-8package

Примечания

  • generic .c version fixed in 2.6.x but not in 2.4.x

  • arch specific asm versions:

  • x86 is not affected

  • ppc32 fixed in 2.4.22-rc4

  • not an issue on alpha, see bug #280492

  • above fixes s390x, ppc64 and s390 and generic C version

EPSS

Процентиль: 64%
0.00473
Низкий

Связанные уязвимости

ubuntu
почти 22 года назад

Описание отсутствует

redhat
почти 22 года назад

The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the buffer on architectures other than x86, as opposed to the expected behavior of strncpy as implemented in libc, which could lead to information leaks.

nvd
почти 22 года назад

The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the buffer on architectures other than x86, as opposed to the expected behavior of strncpy as implemented in libc, which could lead to information leaks.

github
около 3 лет назад

The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the buffer on architectures other than x86, as opposed to the expected behavior of strncpy as implemented in libc, which could lead to information leaks.

EPSS

Процентиль: 64%
0.00473
Низкий