Source: net-tools
Version: 2.10-1.1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for net-tools.

CVE-2025-46836[0]:
| net-tools is a collection of programs that form the base set of the
| NET-3 networking distribution for the Linux operating system. Inn
| versions up to and including 2.10, the Linux network utilities (like
| ifconfig) from the net-tools package do not properly validate the
| structure of /proc files when showing interfaces. `get_name()` in
| `interface.c` copies interface labels from `/proc/net/dev` into a
| fixed 16-byte stack buffer without bounds checking, leading to
| possible arbitrary code execution or crash. The known attack path
| does not require privilege but also does not provide privilege
| escalation in this scenario. A patch is available and expected to be
| part of version 2.20.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-46836
    https://www.cve.org/CVERecord?id=CVE-2025-46836
[1] https://github.com/ecki/net-tools/security/advisories/GHSA-pfwf-h6m3-63wf
[2] 
https://github.com/ecki/net-tools/commit/7a8f42fb20013a1493d8cae1c43436f85e656f2d

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to