Описание
The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the buffer on architectures other than x86, as opposed to the expected behavior of strncpy as implemented in libc, which could lead to information leaks.
Дополнительная информация
Статус:
Low
https://bugzilla.redhat.com/show_bug.cgi?id=1617040security flaw
EPSS
Процентиль: 64%
0.00473
Низкий
Связанные уязвимости
nvd
почти 22 года назад
The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the buffer on architectures other than x86, as opposed to the expected behavior of strncpy as implemented in libc, which could lead to information leaks.
debian
почти 22 года назад
The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the ...
github
около 3 лет назад
The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the buffer on architectures other than x86, as opposed to the expected behavior of strncpy as implemented in libc, which could lead to information leaks.
EPSS
Процентиль: 64%
0.00473
Низкий