First published: Fri Jul 01 2022(Updated: )
+*5.9.2*: + security: + - These two CVEs can be exploited by a user with read-only credentials: + - <a href="https://access.redhat.com/security/cve/CVE-2022-24805">CVE-2022-24805</a> A buffer overflow in the handling of the INDEX of + NET-SNMP-VACM-MIB can cause an out-of-bounds memory access. + - <a href="https://access.redhat.com/security/cve/CVE-2022-24809">CVE-2022-24809</a> A malformed OID in a GET-NEXT to the nsVacmAccessTable + can cause a NULL pointer dereference. + - These CVEs can be exploited by a user with read-write credentials: + - <a href="https://access.redhat.com/security/cve/CVE-2022-24806">CVE-2022-24806</a> Improper Input Validation when SETing malformed + OIDs in master agent and subagent simultaneously + - <a href="https://access.redhat.com/security/cve/CVE-2022-24807">CVE-2022-24807</a> A malformed OID in a SET request to + SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an + out-of-bounds memory access. + - <a href="https://access.redhat.com/security/cve/CVE-2022-24808">CVE-2022-24808</a> A malformed OID in a SET request to + NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference + - <a href="https://access.redhat.com/security/cve/CVE-2022-24810">CVE-2022-24810</a> A malformed OID in a SET to the nsVacmAccessTable + can cause a NULL pointer dereference. + - To avoid these flaws, use strong SNMPv3 credentials and do not share them. + If you must use SNMPv1 or SNMPv2c, use a complex community string + and enhance the protection by restricting access to a given IP address range. + - Thanks are due to Yu Zhang of VARAS@IIE and Nanyu Zhong of VARAS@IIE for + reporting the following CVEs that have been fixed in this release, and + to Arista Networks for providing fixes.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/net-snmp | <5.9.2 | 5.9.2 |
Net-snmp Net-snmp | <5.9.2 | |
Fedoraproject Fedora | =36 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Redhat Enterprise Linux | =9.0 | |
Redhat Enterprise Linux Eus | =9.2 | |
Redhat Enterprise Linux Eus | =9.4 | |
Redhat Enterprise Linux For Arm 64 | =9.0 | |
Redhat Enterprise Linux For Arm 64 | =9.2_aarch64 | |
Redhat Enterprise Linux For Arm 64 | =9.4_aarch64 | |
Redhat Enterprise Linux For Arm 64 Eus | =9.4_aarch64 | |
Redhat Enterprise Linux For Ibm Z Systems | =9.0 | |
Redhat Enterprise Linux For Ibm Z Systems | =9.2_s390x | |
Redhat Enterprise Linux For Ibm Z Systems | =9.4_s390x | |
Redhat Enterprise Linux For Ibm Z Systems Eus | =9.4_s390x | |
Redhat Enterprise Linux For Power Little Endian | =9.0 | |
Redhat Enterprise Linux For Power Little Endian Eus | =9.2_ppc64le | |
Redhat Enterprise Linux For Power Little Endian Eus | =9.4_ppc64le | |
Redhat Enterprise Linux Server Aus | =9.2 | |
Redhat Enterprise Linux Server Aus | =9.4 | |
Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions | =9.2_ppc64le | |
Redhat Enterprise Linux Server Update Services For Sap Solutions | =9.2 | |
Redhat Enterprise Linux Update Services For Sap Solutions | =9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.