Today we are releasing Net-SNMP 5.9.5 and 5.10.pre2, which addresses a
critical security vulnerability (CVE-2025-68615) in snmptrapd.  All
users of the snmptrapd daemon are encouraged to update their software
immediately. In short, a specially crafted packet to an net-snmp
snmptrapd daemon can cause a buffer overflow and the daemon to crash.

Note that although Net-SNMP has had very few security vulnerabilities
over the years, the SNMP services of both the agent and the trap
receiver should never be run on untrusted networks due to the
sensitivity of the information SNMP has available to it.  If you are
running any agent or trap receiver on a non-private network, now is a
good time to re-evaluate your deployment model.

Credits:
We thank buddurid working with Trend Micro Zero Day Initiative for
finding and reproting this vulnerability.

Longer NEWS sections:

*5.10*:

    snmptrapd:
      - fixed a critical vulnerability triggered by a specially crafted trap

    snmplib:
      - Reject invalid input in asn_realloc_rbuild_string to prevent
        NULL dereference 
      - Fix memory leaks in parse_enumlist, netsnmp_transport_filter_add,
        and se_add_pair_to_list
      - Optimize init_snmp_enum to be faster by calling calloc once 
      - Do not truncate AGENT-CAPABILITIES descriptions 
      - Use libssh2_session_handshake when available instead of deprecated
        startup function 
      - Rework se_add_pair_to_slist to insert into storage before adding to 
list 
      - Check env_var before reading MIB 
      - Fix parsing of OIDs 0.40.x and 1.40.x 
      - Fix buffer overflow in ASN_OCTET_STR index allocation 
      - Fix stack buffer overflow in se_read_conf and other buffer overflows 
      - Fix out-of-bounds access in netsnmp_hex_to_binary and snmp_log_options 
      - Fix NULL pointer dereferences in netsnmp_ds_handle_config and
        netsnmp_ds_parse_boolean

    snmpd:
      - systemstats_linux: Improve support of "Ip:" fields list from 
        kernel /proc/net/snmp 
      - diskio: Use snprintf for device path generation on Linux  and add 
        malloc checks for BSDs
      - pingCtlTable: Unified handling of memory allocation errors and releases
      - Revert exclusion of certain MIBs if Netlink library is not available 
      - Fix segfaults when varbind cannot be constructed (null pointer) 
      - Fix use-after-free in unregister_mib_context 
      - Fix crash caused by buf being a null pointer in snmp_agent.c 
      - Fix loadave.c out-of-bounds access 
      - Fix possible unix socket path overflow with strncpy 
      - Fix write_vacmAccessStatus use-after-free in mibII 
      - Security vulnerabilty in the ping MIB reported by Christopher Ertl
        from Microsoft fixed

    apps:
      - mib2c-update: Fix broken search path and allow specifying
        generated file name 
      - mib2c: Install correct filename for generic-get-in_addr_t
      - snmpset/agentxtrap: Fix memory leaks 

    perl:
      - Do not send callbacks upon failures to avoid double-frees 
      - Do not crash on resend callbacks 
      - Revert "fix resource leaks" patch because it introduced crashes 
      - Suppress warning message for Socket6 

    building:
      - Support FreeBSD 15 and 16 
      - Support OpenBSD 8
      - Add build support for Windows on ARM
      - MinGW64: Switch from pkg-config to pkgconf 
      - Remove NOAUTODEPS support from Makefile.in 
      - Make --disable-des work
      - Add --with-wolfssl Add support for building and linking with the
        wolfSSL library instead of OpenSSL. Other changes that have been
        included in this patch are: - Only enable AES support if
        EVP_aes_128_cfb() is available. - Add support for detecting SSL
        functions if these have been defined as macros.


*5.9.5*

    snmptrapd:
      - fixed a critical vulnerability (CVE-2025-68615) which can be triggered
        by a specially crafted trap

    snmplib:
      - Add support for IPV6_RECVPKTINFO 
      - Port the SSH domain transport to FreeBSD 
      - Improve error handling in parse_enumlist and other parsing functions 
      - Filter out non-ASCII characters from output 
      - Fix multiple memory leaks in MIB parsing, OID handling, and transport 
filters 
      - Fix multiple buffer overflows triggered when creating ASN packets
      - Fix handling of large/negative values (integer underflows/overflows) 
      - Fix segmentation faults when `varbind` cannot be constructed or buf is 
null 
      - Fix crash in netsnmp_parse_args when passing invalid argument lists 
      - Fix SNMPv3 multithreading support for snmp_sess_open() 

    snmpd:
      - Make UCD-SNMP::dskTable dynamic if includeAllDisks is set.") added
        a verification that drops all filesystems not present in other_fs[]
        table. So add 'ubifs' in other_fs[] to fix it.
      - Fix SIGHUP handling for engineID changes and agent port changes 
      - Fix a use-after-free in unregister_mib_context() 
      - Fix regression of memory leak when using RPMDB macros 
      - Improve cache management: clear timer_id on stop, keep cache flags 
unchanged 
      - Always open libkvm in "safe mode" on FreeBSD 
      - Fix crash when snmptrapd subagent terminates the TCP connection 

    apps:
      - snmpusm: Improve error handling and fix memory leaks 
      - sshtosnmp: Avoid EINVAL when passing credentials over SSH unix domain 
socket 
      - snmptest: Plug a possible memory leak 
      - snmpget: Avoid leak if parsing OID fails 

    MIBs:
      - EtherLike-MIB: Optimize Linux implementation to use netlink statistics 
      - IP-MIB: Add Linux 6.7 compatibility for parsing /proc/net/snmp 
      - LM-SENSORS-MIB: Support negative temperatures 
      - SNMP-TLS-TM-MIB: Update to RFC 9456 and allow TLS protocols higher than 
TLS1.0 
      - HOST-RESOURCES-MIB: Add support for RPM SQLite DB background 

    building:
      - Add support for Windows on ARM 
      - Support OpenBSD 8, FreeBSD 15/16, and DragonflyBSD 
      - Fix build for OS/X versions prior to 10.6.0 
      - Windows: Bump OpenSSL version and fix library paths 
      - MinGW64: Switch from pkg-config to pkgconf 
      - Add --with-wolfssl Add support for building and linking with the
        wolfSSL library instead of OpenSSL. Other changes that have been
        included in this patch are: - Only enable AES support if
        EVP_aes_128_cfb() is available. - Add support for detecting SSL
        functions if these have been defined as macros.


-- 
Wes Hardaker
Please mail all replies to [email protected]


_______________________________________________
Net-snmp-users mailing list
[email protected]
Please see the following page to unsubscribe or change other options:
https://lists.sourceforge.net/lists/listinfo/net-snmp-users

Reply via email to