Created attachment 248876 [details] patch *5.9.4*: IMPORTANT: SNMP over TLS and/or DTLS are not functioning properly in this release with various versions of OpenSSL and will be fixed in a future release. libsnmp: - Remove the SNMP_SWIPE_MEM() macro Remove this macro since it is not used in the Net-SNMP code base. - DISPLAY-HINT fixes - Miscellanious improvements to the transports - Handle multiple oldEngineID configuration lines - fixes for DNS names longer than 63 characters agent: - Added a ignoremount configuration option for the HOST-MIB - disallow SETs with a NULL varbind - fix the --enable-minimalist build apps: - snmpset: allow SET with NULL varbind for testing - snmptrapd: improved MySQL logging code general: - configure: Remove -Wno-deprecated as it is no longer needed - miscellanious ther bug fixes, build fixes and cleanups *5.9.3*: security: - These two CVEs can be exploited by a user with read-only credentials: - CVE-2022-24805 A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access. - CVE-2022-24809 A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference. - These CVEs can be exploited by a user with read-write credentials: - CVE-2022-24806 Improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously - CVE-2022-24807 A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access. - CVE-2022-24808 A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference - CVE-2022-24810 A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference. - To avoid these flaws, use strong SNMPv3 credentials and do not share them. If you must use SNMPv1 or SNMPv2c, use a complex community string and enhance the protection by restricting access to a given IP address range. - Thanks are due to Yu Zhang of VARAS@IIE and Nanyu Zhong of VARAS@IIE for reporting the following CVEs that have been fixed in this release, and to Arista Networks for providing fixes. Windows: - WinExtDLL: Fix multiple compiler warnings - WinExtDLL: Make long strings occupy a single line Make it easier to look up error messages in the source code by making long strings occupy a single source code line. - WinExtDLL: Restore MIB-II support Make winExtDLL work on 64-bit Windows systems") caused snmpd to skip MIB-II on 64-bit systems. IF-MIB: Update ifTable entries even if the interface name has changed At least on Linux a network interface index may be reused for a network interface with a different name. Hence this patch that enables replacing network interface information even if the network interface name has changed. unspecified: - Moved transport code into a separate subdirectory in snmplib - Snmplib: remove inline versions of container funcs". misc: - snmp-create-v3-user: Fix the snmpd.conf path @datadir@ is expanded in ${datarootdir} so datarootdir must be set before @datadir@ is used. *5.9.2*: skipped due to a last minute library versioning found bug -- use 5.9.3 instead
Committed, thanks!
A commit in branch main references this bug: URL: https://cgit.FreeBSD.org/ports/commit/?id=647eff0a345198ed8084133a35472127f3a2b757 commit 647eff0a345198ed8084133a35472127f3a2b757 Author: Ryan Steinmetz <zi@FreeBSD.org> AuthorDate: 2024-03-04 16:08:42 +0000 Commit: Ryan Steinmetz <zi@FreeBSD.org> CommitDate: 2024-03-04 16:10:35 +0000 net-mgmt/net-snmp: Update to 5.9.4 PR: 277436 Submitted by: Ivan Rozhuk <rozhuk.im@gmail.com> net-mgmt/net-snmp/Makefile | 15 ++-- net-mgmt/net-snmp/distinfo | 6 +- net-mgmt/net-snmp/files/patch-Makefile.in | 8 +- ...gent_mibgroup_hardware_memory_memory__freebsd.c | 4 +- ..._mibgroup_ip-mib_data__access_scalars__sysctl.c | 4 +- .../net-snmp/files/patch-agent_mibgroup_mibII_ip.c | 6 +- .../files/patch-agent_mibgroup_mibII_tcp.c | 6 +- .../patch-include_net-snmp_system_freebsd15.h | 10 +-- .../files/patch-net-snmp-create-v3-user.in | 14 +--- net-mgmt/net-snmp/pkg-plist | 97 +++++++++++----------- 10 files changed, 79 insertions(+), 91 deletions(-)