./net/net-snmp, Extensible SNMP implementation

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: CURRENT, Version: 5.9.3nb1, Package name: net-snmp-5.9.3nb1, Maintainer: adam

Net-SNMP contains various tools relating to the Simple Network Management
Protocol including:

* an extensible agent
* an SNMP library
* tools to request or set information from SNMP agents
* tools to generate and handle SNMP traps
* a version of the unix 'netstat' command using SNMP

This package is originally based on the Carnegie Mellon University
SNMP implementation (version 2.1.2.1), but has developed significantly
since then.

DEINSTALL [+/-]

Required to run:
[lang/perl5] [security/openssl] [pkgtools/osabi]

Required to build:
[pkgtools/cwrappers]

Package options: inet6, perl, ssl

Master sites:

Filesize: 6491.162 KB

Version history: (Expand)


CVS history: (Expand)


   2023-07-06 11:43:03 by Thomas Klausner | Files touched by this commit (2483)
Log message:
*: recursive bump for perl 5.38
   2023-01-14 22:11:35 by matthew green | Files touched by this commit (3)
Log message:
handle merged inpcb code since 9.99.104:
  http://mail-index.netbsd.org/source-changes/2022/10/28/msg141800.html

this is part 2 of fixes for net-snmp, and should work now (though i'm not
sure how to test properly, but it builds on both pre-/post- merge.)
   2023-01-14 00:14:32 by David H. Gutteridge | Files touched by this commit (2)
Log message:
net-snmp: NetBSD >= 9.99.104 build fixes (part one)

Address fallout from struct inpcb changes in NetBSD 9.99.104, as
impacts ipv6.c, specifically. Note this is compile-tested only (on
9.99.108 and 9.3_STABLE), I don't use this package (nor any of its
dependants) and haven't tested the functionality.

(At least tcpTable.c and udpTable.c also need adjustments. I don't have
the time or patience to deal with them at the moment, I'm so checking
in what I've adjusted so far.)

(The upstream code in ipv6.c uses two inconsistent approaches to handle
differences in NetBSD versions. I opted for the more explicit code
blocks everywhere, to avoid confusion. I didn't bother using the new
macros added in 9.99.104 to fetch specific struct members, as they
don't cover much of what's needed here anyway, and would arguably just
make things look even more ugly.)
   2022-10-25 21:33:15 by Jonathan Perkin | Files touched by this commit (1)
Log message:
net-snmp: Fix broken logic.
   2022-10-18 14:02:27 by Adam Ciarcinski | Files touched by this commit (1)
Log message:
net-snmp: remove unused patch
   2022-10-18 14:01:53 by Adam Ciarcinski | Files touched by this commit (43) | Package updated
Log message:
net-snmp py-netsnmp: updated to 5.9.3

*5.9.3*:
    security:
      - These two CVEs can be exploited by a user with read-only credentials:
          - CVE-2022-24805 A buffer overflow in the handling of the INDEX of
            NET-SNMP-VACM-MIB can cause an out-of-bounds memory access.
          - CVE-2022-24809 A malformed OID in a GET-NEXT to the nsVacmAccessTable
            can cause a NULL pointer dereference.
      - These CVEs can be exploited by a user with read-write credentials:
          - CVE-2022-24806 Improper Input Validation when SETing malformed
            OIDs in master agent and subagent simultaneously
          - CVE-2022-24807 A malformed OID in a SET request to
            SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an
            out-of-bounds memory access.
          - CVE-2022-24808 A malformed OID in a SET request to
            NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference
          - CVE-2022-24810 A malformed OID in a SET to the nsVacmAccessTable
            can cause a NULL pointer dereference.
      - To avoid these flaws, use strong SNMPv3 credentials and do not share them.
        If you must use SNMPv1 or SNMPv2c, use a complex community string
        and enhance the protection by restricting access to a given IP address range.
      - Thanks are due to Yu Zhang of VARAS@IIE and Nanyu Zhong of VARAS@IIE for
        reporting the following CVEs that have been fixed in this release, and
        to Arista Networks for providing fixes.

    misc:
      - Snmp-create-v3-user: Fix the snmpd.conf path   @datadir@ is
        expanded in ${datarootdir} so datarootdir must be set before
        @datadir@ is used.

    general: Many bug fixes

*5.9.2*:
    skipped due to a last minute library versioning found bug -- use 5.9.3 instead

*5.9.1*:
    General: Many bug fixes

*5.9*
    snmplib:
      - Add IPv6 support to DTLSUDP transport CHANGES: snmplib: use new
        netsnmp_sockaddr_storage in netsnmp_addr_pair CHANGES: snmplib: add
        base_transport ptr for tunneled transports

    snmpd:
      - Security vulnerabilty in the ping MIB reported by Christopher Ertl
        from Microsoft fixed
      - Changing to a different uid/gid can only be done once
      - The extend mib is now read-only by default

    snmptrap:
      - BUG: 2899: Patch from Drew Roedersheimer to set library
        engineboots/time values before sending

    unspecified:
      - Add pkg-config support for building applications and sub-agents Use
        the netsnmp package when building Net-SNMP applications. Use the
        netsnmp-agent package when building Net-SNMP subagents.
   2022-08-05 12:55:01 by Adam Ciarcinski | Files touched by this commit (3)
Log message:
net-snmp: do not store configure options; remove Perl module entries from PLIST
   2022-06-28 13:38:00 by Thomas Klausner | Files touched by this commit (3952)
Log message:
*: recursive bump for perl 5.36