On Mon, Jan 17, 2005 at 10:47:18AM +0100, [EMAIL PROTECTED] wrote:
> package kernel-source-2.4.27
> reopen 280492
> thanks
> 
> > Both 2.4 and 2.6 upstream do not NULL terminate dest
> > if count is exceeded. This is documented in the kernel
> > and appears to be quite intentional. I am closing this
> > accordingly.
> 
> I think you missed the point here. The problem is that if the copied
> string is shorter than the destination buffer, part of the old contents of
> the destination remains unchanged and might be leaked to userspace. This
> behaviour IS fixed in 2.6, so upstream thinks it IS a (small) problem [1].
> 
> BTW, I found a patch for ppc64 and s390 [2].
> 
> 
> [1] http://marc.theaimsgroup.com/?l=linux-kernel&m=105796021120436&w=2
> [2] http://www.ultramonkey.org/bugs/patch/linux-2.4.21-strncpy-zero-pad.patch

Thanks.

This really is a very minor problem, and is mostly still not fixed
in 2.6. Actually, the only places it seems to have been fixed
are in the generic.c version and in the s390, the latter due to a
restructure.

The patch from ultramonkey.org above was fished out of 
a Red Hat Kernel RPM (by me). It still seems to be used
in their latest kernel (27.0.1.EL.um.1), so I am going to apply that.
But for the other architectures (mips and alpha) there does not
seem to be a fix available.

To be honest I am pretty dubious about the security tag
on this bug, I don't believe there is a known exploit
and at best the bug seems to be regarded as being minor.
Would it be acceptable to remove the security tag? 

Would you be happy to have the bug closed by application of the patch
you suggested? Or do you want to hold it open because of the
outstanding mips and alpha problem? I am pretty tempted to mark it as
upstream and wontfix and reprioritise as wishlist if that is the case.
Perhaps splitting and reassigning to the relevant misps and alpha
kernel-image packages.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to