Slackware alert SSA:2022-202-01 (net)
From: | Slackware Security Team <security@slackware.com> | |
To: | slackware-security@slackware.com | |
Subject: | [slackware-security] net-snmp (SSA:2022-202-01) | |
Date: | Thu, 21 Jul 2022 11:23:54 -0700 | |
Message-ID: | <alpine.LNX.2.02.2207211123400.3790@connie.slackware.com> |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] net-snmp (SSA:2022-202-01) New net-snmp packages are available for Slackware 15.0 and -current to fix security issues. Here are the details from the Slackware 15.0 ChangeLog: +--------------------------+ patches/packages/net-snmp-5.9.3-i586-1_slack15.0.txz: Upgraded. This update fixes security issues: A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access. A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference. Improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously. A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access. A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference. A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2... https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2... https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2... https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2... https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2... https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2... (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 15.0: ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patc... Updated package for Slackware x86_64 15.0: ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/pa... Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/s... Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current... MD5 signatures: +-------------+ Slackware 15.0 package: 05b8aad483941e2587cff66fa357fa08 net-snmp-5.9.3-i586-1_slack15.0.txz Slackware x86_64 15.0 package: 5beebc819894c94bedbc531d47cfe497 net-snmp-5.9.3-x86_64-1_slack15.0.txz Slackware -current package: 64a9d688e3b36d1635c201b36c2de2d3 n/net-snmp-5.9.3-i586-1.txz Slackware x86_64 -current package: c2c0fdd59ad729ba15037a15c0aaca02 n/net-snmp-5.9.3-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg net-snmp-5.9.3-i586-1_slack15.0.txz +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com +------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- iEYEARECAAYFAmLZmW4ACgkQakRjwEAQIjP/4gCfcRH8ODnoHZYc5NnblCAkgfBm IO8AnA+8iHnSxpFpT+2gaP2Qi9qC7hUf =6CUF -----END PGP SIGNATURE-----