SUSE: 2022:4205-2 moderate: net-snmp | LinuxSecurity.com

   SUSE Security Update: Security update for net-snmp
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:4205-2
Rating:             moderate
References:         #1201103 SLE-11203 
Cross-References:   CVE-2022-24805 CVE-2022-24806 CVE-2022-24807
                    CVE-2022-24808 CVE-2022-24809 CVE-2022-24810
                   
Affected Products:
                    SUSE Linux Enterprise Micro 5.3
                    openSUSE Leap Micro 5.3
______________________________________________________________________________

   An update that fixes 6 vulnerabilities, contains one
   feature is now available.

Description:

   This update for net-snmp fixes the following issues:

     Updated to version 5.9.3 (bsc#1201103, jsc#SLE-11203):

     - CVE-2022-24805: Fixed a buffer overflow in the handling of the INDEX
       of NET-SNMP-VACM-MIB that can cause an out-of-bounds memory access.
     - CVE-2022-24809: Fixed a malformed OID in a GET-NEXT to the
       nsVacmAccessTable that can cause a NULL pointer dereference.
     - CVE-2022-24806: Fixed an improper Input Validation when SETing
       malformed OIDs in master agent and subagent simultaneously.
     - CVE-2022-24807: Fixed a malformed OID in a SET request to
       SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds
       memory access.
     - CVE-2022-24808: Fixed a malformed OID in a SET request to
       NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference.
     - CVE-2022-24810: Fixed a malformed OID in a SET to the
       nsVacmAccessTable can cause a NULL pointer dereference.


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap Micro 5.3:

      zypper in -t patch openSUSE-Leap-Micro-5.3-2022-4205=1

   - SUSE Linux Enterprise Micro 5.3:

      zypper in -t patch SUSE-SLE-Micro-5.3-2022-4205=1



Package List:

   - openSUSE Leap Micro 5.3 (aarch64 x86_64):

      libsnmp40-5.9.3-150300.15.3.1
      libsnmp40-debuginfo-5.9.3-150300.15.3.1
      net-snmp-debuginfo-5.9.3-150300.15.3.1
      net-snmp-debugsource-5.9.3-150300.15.3.1
      snmp-mibs-5.9.3-150300.15.3.1

   - SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64):

      libsnmp40-5.9.3-150300.15.3.1
      libsnmp40-debuginfo-5.9.3-150300.15.3.1
      net-snmp-debuginfo-5.9.3-150300.15.3.1
      net-snmp-debugsource-5.9.3-150300.15.3.1
      snmp-mibs-5.9.3-150300.15.3.1


References:

   https://www.suse.com/security/cve/CVE-2022-24805.html
   https://www.suse.com/security/cve/CVE-2022-24806.html
   https://www.suse.com/security/cve/CVE-2022-24807.html
   https://www.suse.com/security/cve/CVE-2022-24808.html
   https://www.suse.com/security/cve/CVE-2022-24809.html
   https://www.suse.com/security/cve/CVE-2022-24810.html
   https://bugzilla.suse.com/1201103

SUSE: 2022:4205-2 moderate: net-snmp

December 13, 2022
An update that fixes 6 vulnerabilities, contains one feature is now available

Summary

This update for net-snmp fixes the following issues: Updated to version 5.9.3 (bsc#1201103, jsc#SLE-11203): - CVE-2022-24805: Fixed a buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB that can cause an out-of-bounds memory access. - CVE-2022-24809: Fixed a malformed OID in a GET-NEXT to the nsVacmAccessTable that can cause a NULL pointer dereference. - CVE-2022-24806: Fixed an improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously. - CVE-2022-24807: Fixed a malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access. - CVE-2022-24808: Fixed a malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference. - CVE-2022-24810: Fixed a malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap Micro 5.3: zypper in -t patch openSUSE-Leap-Micro-5.3-2022-4205=1 - SUSE Linux Enterprise Micro 5.3: zypper in -t patch SUSE-SLE-Micro-5.3-2022-4205=1 Package List: - openSUSE Leap Micro 5.3 (aarch64 x86_64): libsnmp40-5.9.3-150300.15.3.1 libsnmp40-debuginfo-5.9.3-150300.15.3.1 net-snmp-debuginfo-5.9.3-150300.15.3.1 net-snmp-debugsource-5.9.3-150300.15.3.1 snmp-mibs-5.9.3-150300.15.3.1 - SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64): libsnmp40-5.9.3-150300.15.3.1 libsnmp40-debuginfo-5.9.3-150300.15.3.1 net-snmp-debuginfo-5.9.3-150300.15.3.1 net-snmp-debugsource-5.9.3-150300.15.3.1 snmp-mibs-5.9.3-150300.15.3.1

References

#1201103 SLE-11203

Cross- CVE-2022-24805 CVE-2022-24806 CVE-2022-24807

CVE-2022-24808 CVE-2022-24809 CVE-2022-24810

Affected Products:

SUSE Linux Enterprise Micro 5.3

openSUSE Leap Micro 5.3

https://www.suse.com/security/cve/CVE-2022-24805.html

https://www.suse.com/security/cve/CVE-2022-24806.html

https://www.suse.com/security/cve/CVE-2022-24807.html

https://www.suse.com/security/cve/CVE-2022-24808.html

https://www.suse.com/security/cve/CVE-2022-24809.html

https://www.suse.com/security/cve/CVE-2022-24810.html

https://bugzilla.suse.com/1201103

Severity
Announcement ID: SUSE-SU-2022:4205-2
Rating: moderate

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.