Описание
The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the buffer on architectures other than x86, as opposed to the expected behavior of strncpy as implemented in libc, which could lead to information leaks.
The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the buffer on architectures other than x86, as opposed to the expected behavior of strncpy as implemented in libc, which could lead to information leaks.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2003-0465
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10285
- http://marc.info/?l=linux-kernel&m=105796021120436&w=2
- http://marc.info/?l=linux-kernel&m=105796415223490&w=2
- http://www.redhat.com/support/errata/RHSA-2004-188.html
EPSS
CVE ID
Связанные уязвимости
The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the buffer on architectures other than x86, as opposed to the expected behavior of strncpy as implemented in libc, which could lead to information leaks.
The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the buffer on architectures other than x86, as opposed to the expected behavior of strncpy as implemented in libc, which could lead to information leaks.
The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the ...
EPSS