Bug 6076 - net-snmp new security issue CVE-2012-2141
Summary: net-snmp new security issue CVE-2012-2141
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 2
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact:
URL: http://lwn.net/Vulnerabilities/498638/
Whiteboard: MGA1TOO, mga1-32-OK mga2-32-OK mga2-6...
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2012-05-24 22:57 CEST by David Walser
Modified: 2012-06-27 15:16 CEST (History)
4 users (show)

See Also:
Source RPM: net-snmp-5.6.1-7.mga1.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2012-05-24 22:57:48 CEST
Ubuntu has issued an advisory on May 23:
http://www.ubuntu.com/usn/usn-1450-1/

The patch applied upstream to fix this is attached here:
https://bugzilla.redhat.com/show_bug.cgi?id=815813

Cauldron/Mageia 2 are also affected.
David Walser 2012-05-28 02:36:57 CEST

CC: (none) => guillomovitch

Comment 1 David Walser 2012-05-29 23:31:07 CEST
SuSE has issued an advisory for this today (May 29):
http://lists.opensuse.org/opensuse-updates/2012-05/msg00042.html
David Walser 2012-06-14 21:03:14 CEST

Version: 1 => Cauldron
Whiteboard: (none) => MGA2TOO, MGA1TOO

Comment 2 David Walser 2012-06-20 20:39:02 CEST
RedHat has issued an advisory for this today (June 20):
https://rhn.redhat.com/errata/RHSA-2012-0876.html
Comment 3 David Walser 2012-06-21 18:41:12 CEST
Mandriva has issued an advisory for this today (June 21):
http://www.mandriva.com/en/support/security/advisories/?dis=2010.1&name=MDVSA-2012:099
Comment 4 David Walser 2012-06-21 20:28:12 CEST
Patched packages uploaded for Cauldron, Mageia 2, and Mageia 1.

Advisory:
========================

Updated net-snmp packages fix security vulnerability:

An array index error, leading to out-of heap-based buffer read flaw
was found in the way net-snmp agent performed entries lookup in the
extension table. When certain MIB subtree was handled by the extend
directive, a remote attacker having read privilege to the subtree could
use this flaw to cause a denial of service (snmpd crash) via SNMP GET
request involving a non-existent extension table entry (CVE-2012-2141).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2141
http://www.mandriva.com/en/support/security/advisories/?dis=2010.1&name=MDVSA-2012:099
========================

Updated packages in core/updates_testing:
========================
net-snmp-5.6.1-7.1.mga1
libnet-snmp25-5.6.1-7.1.mga1
libnet-snmp-devel-5.6.1-7.1.mga1
libnet-snmp-static-devel-5.6.1-7.1.mga1
net-snmp-utils-5.6.1-7.1.mga1
net-snmp-tkmib-5.6.1-7.1.mga1
net-snmp-mibs-5.6.1-7.1.mga1
net-snmp-trapd-5.6.1-7.1.mga1
perl-NetSNMP-5.6.1-7.1.mga1
net-snmp-5.7.1-3.1.mga2
libnet-snmp30-5.7.1-3.1.mga2
libnet-snmp-devel-5.7.1-3.1.mga2
libnet-snmp-static-devel-5.7.1-3.1.mga2
net-snmp-utils-5.7.1-3.1.mga2
net-snmp-tkmib-5.7.1-3.1.mga2
net-snmp-mibs-5.7.1-3.1.mga2
net-snmp-trapd-5.7.1-3.1.mga2
perl-NetSNMP-5.7.1-3.1.mga2
python-netsnmp-5.7.1-3.1.mga2

from SRPMS:
net-snmp-5.6.1-7.1.mga1.src.rpm
net-snmp-5.7.1-3.1.mga2.src.rpm

Version: Cauldron => 2
Assignee: bugsquad => qa-bugs
Whiteboard: MGA2TOO, MGA1TOO => MGA1TOO

Comment 5 Dave Hodgins 2012-06-23 04:48:19 CEST
Testing complete on Mageia 1 i586.

No POC, so just testing that smmpd is working ...

$ snmpget -c public localhost system.sysDescr.0
SNMPv2-MIB::sysDescr.0 = STRING: "Linux 2.4.x"

I'll test Mageia 2 i586 shortly.

CC: (none) => davidwhodgins

Comment 6 Dave Hodgins 2012-06-23 04:56:30 CEST
Testing complete on Mageia 2 i586.

Whiteboard: MGA1TOO => MGA1TOO, mga1-32-OK mga2-32-OK

Comment 7 claire robinson 2012-06-23 23:16:23 CEST
Testing complete x86_64 mga2

# service snmpd start
Starting snmpd (via systemctl):                                   [  OK  ]
# snmpget -c public localhost system.sysDescr.0
SNMPv2-MIB::sysDescr.0 = STRING: "Linux 2.4.x"

Should this be reporting Linux 2.4.x ?

Hardware: i586 => All
Whiteboard: MGA1TOO, mga1-32-OK mga2-32-OK => MGA1TOO, mga1-32-OK mga2-32-OK mga2-64-OK

Comment 8 claire robinson 2012-06-23 23:37:50 CEST
Testing complete x86_64 mga1

If 2.4.x is correct then this can be validated.

Whiteboard: MGA1TOO, mga1-32-OK mga2-32-OK mga2-64-OK => MGA1TOO, mga1-32-OK mga2-32-OK mga2-64-OK mga1-64-OK

Comment 9 David Walser 2012-06-24 00:33:07 CEST
My goodness!  This comes from the snmpd.conf file that the package installs.  This file hasn't been modified at all since before Mandriva's SVN was created in 2007, and probably not since it was first copied from RedHat/Fedora many many years ago.  That string is really just put into the config file as a generic placeholder, and the sysadmin is expected to change it to whatever they want it to say for that machine.  Obviously it's not "correct" so to speak, but it's not anything we need to hold up this update for.

At some point, someone should go through and re-sync a lot of the sources in this package with Fedora circa 2012 :o), and Mandriva needs to do this as well, since theirs is the same as ours.  I guess this is what happens when a package isn't well maintained for years, or when separate sources from upstream are copied from somewhere else.  We should do that re-sync in Cauldron, but there's probably more risk than benefit in trying to do it for these updates, so I think they're fine as-is for now.

Thanks for catching this.
Comment 10 claire robinson 2012-06-24 00:54:14 CEST
Thanks for checking, I thought it was odd :)

Validating then

Please see comment 4 for advisory and srpms

Updates for mga1 and mga2

Could sysadmin please push from core/updates_testing to core/updates

Thanks!

Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs

Comment 11 Thomas Backlund 2012-06-27 15:16:45 CEST
Update pushed:
https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0128

Status: NEW => RESOLVED
CC: (none) => tmb
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.