Improper Input Validation Affecting net-tools package, versions <2.10-0.1+deb12u1


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.11% (31st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Input Validation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN12-NETTOOLS-10167516
  • published15 May 2025
  • disclosed14 May 2025

Introduced: 14 May 2025

CVE-2025-46836  (opens in a new tab)
CWE-20  (opens in a new tab)
CWE-121  (opens in a new tab)

How to fix?

Upgrade Debian:12 net-tools to version 2.10-0.1+deb12u1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream net-tools package and not the net-tools package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

net-tools is a collection of programs that form the base set of the NET-3 networking distribution for the Linux operating system. Inn versions up to and including 2.10, the Linux network utilities (like ifconfig) from the net-tools package do not properly validate the structure of /proc files when showing interfaces. get_name() in interface.c copies interface labels from /proc/net/dev into a fixed 16-byte stack buffer without bounds checking, leading to possible arbitrary code execution or crash. The known attack path does not require privilege but also does not provide privilege escalation in this scenario. A patch is available and expected to be part of version 2.20.

CVSS Base Scores

version 3.1