Your message dated Sun, 20 Jun 2010 13:04:33 +0000
with message-id <[email protected]>
and subject line Bug#576281: fixed in libnids 1.23-1.2
has caused the Debian Bug report #576281,
regarding libnids: CVE-2010-0751 null pointer dereference
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
576281: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=576281
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: libnids
Severity: important
Tags: security patch
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for libnids.
CVE-2010-1144[0]:
| A vulnerability has been reported in Libnids, which can be exploited by
| malicious people to cause a DoS (Denial of Service).
|
| The vulnerability is caused due to a NULL pointer dereference error in
| src/ip_fragment.c, which can be exploited to crash an application using the
| library by sending specially crafted network traffic.
If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.
I extracted the patch from the diff to the new version, attached.
For further information see:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1144
http://security-tracker.debian.org/tracker/CVE-2010-1144
--
Nico Golde - http://www.ngolde.de - [email protected] - GPG: 0xA0A0AAAA
For security reasons, all text in this mail is double-rot13 encrypted.
--- libnids-1.23/src/ip_fragment.c 2008-02-21 11:30:47.000000000 +0100
+++ libnids-1.24/src/ip_fragment.c 2010-03-14 11:15:58.000000000 +0100
@@ -378,7 +379,7 @@
ip_evictor(void)
{
// fprintf(stderr, "ip_evict:numpack=%i\n", numpack);
- while (this_host->ip_frag_mem > IPFRAG_LOW_THRESH) {
+ while (this_host && this_host->ip_frag_mem > IPFRAG_LOW_THRESH) {
if (!this_host->ipqueue)
panic("ip_evictor: memcount");
ip_free(this_host->ipqueue);
pgpUU2UcmvJg0.pgp
Description: PGP signature
--- End Message ---
--- Begin Message ---
Source: libnids
Source-Version: 1.23-1.2
We believe that the bug you reported is fixed in the latest version of
libnids, which is due to be installed in the Debian FTP archive:
libnids-dev_1.23-1.2_amd64.deb
to main/libn/libnids/libnids-dev_1.23-1.2_amd64.deb
libnids1.21_1.23-1.2_amd64.deb
to main/libn/libnids/libnids1.21_1.23-1.2_amd64.deb
libnids_1.23-1.2.diff.gz
to main/libn/libnids/libnids_1.23-1.2.diff.gz
libnids_1.23-1.2.dsc
to main/libn/libnids/libnids_1.23-1.2.dsc
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Nico Golde <[email protected]> (supplier of updated libnids package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Sun, 20 Jun 2010 14:20:06 +0200
Source: libnids
Binary: libnids-dev libnids1.21
Architecture: source amd64
Version: 1.23-1.2
Distribution: unstable
Urgency: high
Maintainer: Vasilis Pappas <[email protected]>
Changed-By: Nico Golde <[email protected]>
Description:
libnids-dev - IP defragmentation TCP segment reassembly library (development)
libnids1.21 - IP defragmentation TCP segment reassembly library
Closes: 576281
Changes:
libnids (1.23-1.2) unstable; urgency=high
.
* Non-maintainer upload by the Security Team.
* Fix NULL ptr dereference in src/ip_fragment.c which can
be used to cause denial of service conditiions with applications
using this library (Closes: #576281).
Checksums-Sha1:
dabb02c81c9ac7793c9a205c811a5e2ecbd348d0 1049 libnids_1.23-1.2.dsc
6e1bd3c3fcad7edaa41a04ff9c43fde22dc0d5b3 5463 libnids_1.23-1.2.diff.gz
e31e20022f81c7a290d2db847416a18c6bc43f59 72550 libnids-dev_1.23-1.2_amd64.deb
50ea089149185110f0c31b2834b931cb80fcc27c 27024 libnids1.21_1.23-1.2_amd64.deb
Checksums-Sha256:
26630be9efec3c72ac1a0134a3117d7e59048b68aa02c4348d64642ea9332225 1049
libnids_1.23-1.2.dsc
df27f120da5e72a337c0e35e2c1bfc99aa48f7e84a4d600f2438f093cab8ecef 5463
libnids_1.23-1.2.diff.gz
8d2b74f6a177adb5d1a6fa86df3a5fa5831bd9ef129304b58376c7d7975b54c5 72550
libnids-dev_1.23-1.2_amd64.deb
c37b12cc9055cb7d0e08dd6489ab59dbf51bd137846d0e32622d1c6d7cd4f0cc 27024
libnids1.21_1.23-1.2_amd64.deb
Files:
c287caaee77041326f970cc242094b1d 1049 libdevel optional libnids_1.23-1.2.dsc
691d0d825d46a8672c2a8f5763f0ff9b 5463 libdevel optional
libnids_1.23-1.2.diff.gz
b3f9e57031ff32e55af64cdc8563d5cf 72550 libdevel optional
libnids-dev_1.23-1.2_amd64.deb
3a121709d21a2bd21042c2777ed4ccb0 27024 libs optional
libnids1.21_1.23-1.2_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAkweDJcACgkQHYflSXNkfP/ggQCffzUAO3PFtvZ/EFMIwWEh7hFi
nIkAn2H4Y937nlhfnqKLBlI9drVCuako
=x/Os
-----END PGP SIGNATURE-----
--- End Message ---