CVE-2022-24809
Published: 8 July 2022
net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-only credentials can use a malformed OID in a `GET-NEXT` to the `nsVacmAccessTable` to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.
Notes
| Author | Note |
|---|---|
| mdeslaur | same commits as CVE-2022-24805 |
Priority
Status
| Package | Release | Status |
|---|---|---|
|
net-snmp Launchpad, Ubuntu, Debian |
bionic |
Released
(5.7.3+dfsg-1.8ubuntu3.7)
|
| focal |
Released
(5.8+dfsg-2ubuntu2.4)
|
|
| impish |
Ignored
(end of life)
|
|
| jammy |
Released
(5.9.1+dfsg-1ubuntu2.2)
|
|
| kinetic |
Released
(5.9.1+dfsg-4ubuntu2)
|
|
| trusty |
Released
(5.7.2~dfsg-8.1ubuntu3.3+esm3)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
| upstream |
Released
(5.9.2)
|
|
| xenial |
Released
(5.7.3+dfsg-1ubuntu4.6+esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
|
Patches: upstream: https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937 upstream: https://github.com/net-snmp/net-snmp/commit/9a0cd7c00947d5e1c6ceb54558d454f87c3b8341 |
||