Debian: iproute Denial of service vulnerability

    Date19 Apr 2004
    CategoryDebian
    2141
    Posted ByLinuxSecurity Advisories
    Herbert Xu reported that local users could cause a denial of service against iproute, a set of tools for controlling networking in Linux kernels.
    
    Debian Security Advisory DSA 492-1                     This email address is being protected from spambots. You need JavaScript enabled to view it. 
    http://www.debian.org/security/                             Matt Zimmerman
    April 18th, 2004                          http://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : iproute
    Vulnerability  : denial of service
    Problem-Type   : local
    Debian-specific: no
    CVE Ids        : CAN-2003-0856
    Debian Bug     : 242994
    
    Herbert Xu reported that local users could cause a denial of service
    against iproute, a set of tools for controlling networking in Linux
    kernels.  iproute uses the netlink interface to communicate with the
    kernel, but failed to verify that the messages it received came from
    the kernel (rather than from other user processes).
    
    For the current stable distribution (woody) this problem has been
    fixed in version 20010824-8woody1.
    
    For the unstable distribution (sid), this problem will be fixed soon.
    
    We recommend that you update your iproute package.
    
    Upgrade Instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
    
      Source archives:
    
         http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1.dsc
          Size/MD5 checksum:      583 4ddfda116fcaa5670bd0a395ce62c249
         http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1.diff.gz
          Size/MD5 checksum:    30926 818c356e9a703804987a99452a5cb5bf
         http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824.orig.tar.gz
          Size/MD5 checksum:   140139 b05a4e375d9468be3a1dd3f0e83daee8
    
      Alpha architecture:
    
         http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_alpha.deb
          Size/MD5 checksum:   535862 84d99c4199f8ae7eab695f8e06a9de6b
    
      ARM architecture:
    
         http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_arm.deb
          Size/MD5 checksum:   509116 d4e7b52ca059ab99b67a9f01e07ccb1e
    
      Intel IA-32 architecture:
    
         http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_i386.deb
          Size/MD5 checksum:   499718 194a49253bf81cdcf702f935e2b35534
    
      Intel IA-64 architecture:
    
         http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_ia64.deb
          Size/MD5 checksum:   570038 180ddee3ed7373989d54a2b3783c58f2
    
      HP Precision architecture:
    
         http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_hppa.deb
          Size/MD5 checksum:   525956 30b521f7417acb9150cd2b79f065734d
    
      Motorola 680x0 architecture:
    
         http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_m68k.deb
          Size/MD5 checksum:   489736 196339f8c47b861aff2c110e5405ecc1
    
      Big endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_mips.deb
          Size/MD5 checksum:   512874 2781925dd48d9bb9cb8b948e397b2947
    
      Little endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_mipsel.deb
          Size/MD5 checksum:   513570 b61d21209d3cd1bf6b828396ef347676
    
      PowerPC architecture:
    
         http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_powerpc.deb
          Size/MD5 checksum:   507942 cfa15b75474d3faa2bdaeb1b3c399d99
    
      IBM S/390 architecture:
    
         http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_s390.deb
          Size/MD5 checksum:   503396 13e689f21473365267f7f73b44b05c2f
    
      Sun Sparc architecture:
    
         http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_sparc.deb
          Size/MD5 checksum:   515030 fbc32ebc11a4cb14b98154b6cb257c8c
    
      These files will probably be moved into the stable distribution on
      its next revision.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb  http://security.debian.org/ stable/updates main
    For dpkg-ftp:  ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and  http://packages.debian.org/
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"22","type":"x","order":"1","pct":55,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":12.5,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"13","type":"x","order":"3","pct":32.5,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.