| Summary: | net-snmp new DoS security issue (CVE-2015-5621) | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | major | ||
| Priority: | Normal | CC: | shlomif, sysadmin-bugs |
| Version: | 4 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/654880/ | ||
| Whiteboard: | has_procedure advisory MGA4-32-OK MGA4-64-OK | ||
| Source RPM: | net-snmp-5.7.2-22.mga5.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2015-04-16 16:50:05 CEST
David Walser
2015-04-16 16:50:10 CEST
Whiteboard:
(none) =>
MGA5TOO, MGA4TOO Still no response to the CVE request. Upstream patch checked into Mageia 4 and Cauldron SVN. Freeze push requested. Patched packages uploaded for Mageia 4 and Cauldron. Testing Procedure: https://bugs.mageia.org/show_bug.cgi?id=12236#c5 Advisory: ======================== Updated net-snmp packages fix security vulnerability: It was discovered that the snmp_pdu_parse() function could leave incompletely parsed varBind variables in the list of variables. A remote, unauthenticated attacker could exploit this flaw to cause a crash or, potentially, execute arbitrary code. References: https://bugzilla.redhat.com/show_bug.cgi?id=1212408 ======================== Updated packages in core/updates_testing: ======================== net-snmp-5.7.2-13.3.mga4 libnet-snmp30-5.7.2-13.3.mga4 libnet-snmp-devel-5.7.2-13.3.mga4 libnet-snmp-static-devel-5.7.2-13.3.mga4 net-snmp-utils-5.7.2-13.3.mga4 net-snmp-tkmib-5.7.2-13.3.mga4 net-snmp-mibs-5.7.2-13.3.mga4 net-snmp-trapd-5.7.2-13.3.mga4 perl-NetSNMP-5.7.2-13.3.mga4 python-netsnmp-5.7.2-13.3.mga4 from net-snmp-5.7.2-13.3.mga4.src.rpm Version:
Cauldron =>
4 Works fine in VBox i586 (32-bit) and x86-64 (64-bit) VMs. Adding MGA-OKs. CC:
(none) =>
shlomif Validating. Advisory uploaded. Please push to 4 updates Thanks! Keywords:
(none) =>
validated_update An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2015-0187.html Status:
NEW =>
RESOLVED
David Walser
2015-05-05 19:04:16 CEST
URL:
(none) =>
http://lwn.net/Vulnerabilities/643228/ This has finally been assigned CVE-2015-5621: http://openwall.com/lists/oss-security/2015/07/31/1 Summary:
net-snmp new DoS security issue =>
net-snmp new DoS security issue (CVE-2015-5621)
David Walser
2015-08-19 12:51:39 CEST
URL:
http://lwn.net/Vulnerabilities/643228/ =>
http://lwn.net/Vulnerabilities/654880/ |