Bug 15712 - net-snmp new DoS security issue (CVE-2015-5621)
Summary: net-snmp new DoS security issue (CVE-2015-5621)
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 4
Hardware: i586 Linux
Priority: Normal major
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/654880/
Whiteboard: has_procedure advisory MGA4-32-OK MGA...
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2015-04-16 16:50 CEST by David Walser
Modified: 2015-08-19 12:51 CEST (History)
2 users (show)

See Also:
Source RPM: net-snmp-5.7.2-22.mga5.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2015-04-16 16:50:05 CEST
A DoS security issue in net-snmp was fixed upstream:
https://bugzilla.redhat.com/show_bug.cgi?id=1212408

A CVE was requested in this thread:
http://openwall.com/lists/oss-security/2015/04/16/15

Mageia 4 and Mageia 5 are affected.

Reproducible: 

Steps to Reproduce:
David Walser 2015-04-16 16:50:10 CEST

Whiteboard: (none) => MGA5TOO, MGA4TOO

Comment 1 David Walser 2015-04-30 19:06:50 CEST
Still no response to the CVE request.

Upstream patch checked into Mageia 4 and Cauldron SVN.  Freeze push requested.
Comment 2 David Walser 2015-04-30 23:40:49 CEST
Patched packages uploaded for Mageia 4 and Cauldron.

Testing Procedure:
https://bugs.mageia.org/show_bug.cgi?id=12236#c5

Advisory:
========================

Updated net-snmp packages fix security vulnerability:

It was discovered that the snmp_pdu_parse() function could leave incompletely
parsed varBind variables in the list of variables. A remote, unauthenticated
attacker could exploit this flaw to cause a crash or, potentially, execute
arbitrary code.

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1212408
========================

Updated packages in core/updates_testing:
========================
net-snmp-5.7.2-13.3.mga4
libnet-snmp30-5.7.2-13.3.mga4
libnet-snmp-devel-5.7.2-13.3.mga4
libnet-snmp-static-devel-5.7.2-13.3.mga4
net-snmp-utils-5.7.2-13.3.mga4
net-snmp-tkmib-5.7.2-13.3.mga4
net-snmp-mibs-5.7.2-13.3.mga4
net-snmp-trapd-5.7.2-13.3.mga4
perl-NetSNMP-5.7.2-13.3.mga4
python-netsnmp-5.7.2-13.3.mga4

from net-snmp-5.7.2-13.3.mga4.src.rpm

Version: Cauldron => 4
Assignee: bugsquad => qa-bugs
Whiteboard: MGA5TOO, MGA4TOO => has_procedure

Comment 3 Shlomi Fish 2015-05-04 20:16:48 CEST
Works fine in VBox i586 (32-bit) and x86-64 (64-bit) VMs. Adding MGA-OKs.

CC: (none) => shlomif
Whiteboard: has_procedure => MGA4-64-OK has_procedure MGA4-32-OK

Comment 4 claire robinson 2015-05-05 11:13:49 CEST
Validating. Advisory uploaded.

Please push to 4 updates

Thanks!

Keywords: (none) => validated_update
Whiteboard: MGA4-64-OK has_procedure MGA4-32-OK => has_procedure advisory MGA4-32-OK MGA4-64-OK
CC: (none) => sysadmin-bugs

Comment 5 Mageia Robot 2015-05-05 15:37:33 CEST
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2015-0187.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED

David Walser 2015-05-05 19:04:16 CEST

URL: (none) => http://lwn.net/Vulnerabilities/643228/

Comment 6 David Walser 2015-07-31 15:07:44 CEST
This has finally been assigned CVE-2015-5621:
http://openwall.com/lists/oss-security/2015/07/31/1

Summary: net-snmp new DoS security issue => net-snmp new DoS security issue (CVE-2015-5621)

David Walser 2015-08-19 12:51:39 CEST

URL: http://lwn.net/Vulnerabilities/643228/ => http://lwn.net/Vulnerabilities/654880/


Note You need to log in before you can comment on or make changes to this bug.