DSA-492-1 iproute -- denial of service

Related Vulnerabilities: CVE-2003-0856  

Herbert Xu reported that local users could cause a denial of service against iproute, a set of tools for controlling networking in Linux kernels. iproute uses the netlink interface to communicate with the kernel, but failed to verify that the messages it received came from the kernel (rather than from other user processes). For the current stable distribution (woody) this problem has been fixed in version 20010824-8woody1. For the unstable distribution (sid), this problem will be fixed soon. We recommend that you update your iproute package.

Debian Security Advisory

DSA-492-1 iproute -- denial of service

Date Reported:
18 Apr 2004
Affected Packages:
iproute
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 242994.
In the Bugtraq database (at SecurityFocus): BugTraq ID 9092.
In Mitre's CVE dictionary: CVE-2003-0856.
More information:

Herbert Xu reported that local users could cause a denial of service against iproute, a set of tools for controlling networking in Linux kernels. iproute uses the netlink interface to communicate with the kernel, but failed to verify that the messages it received came from the kernel (rather than from other user processes).

For the current stable distribution (woody) this problem has been fixed in version 20010824-8woody1.

For the unstable distribution (sid), this problem will be fixed soon.

We recommend that you update your iproute package.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Source:
http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1.dsc
http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1.diff.gz
http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_alpha.deb
ARM:
http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/i/iproute/iproute_20010824-8woody1_sparc.deb

MD5 checksums of the listed files are available in the original advisory.