First published: Thu Jul 07 2022(Updated: )
From <a href="https://github.com/net-snmp/net-snmp/blob/v5.9.2/CHANGES">https://github.com/net-snmp/net-snmp/blob/v5.9.2/CHANGES</a> <a href="https://access.redhat.com/security/cve/CVE-2022-24806">CVE-2022-24806</a> Improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/net-snmp | <5.9.2 | 5.9.2 |
Net-SNMP | <5.9.2 | |
Fedora | =35 | |
Fedora | =36 | |
Debian | =10.0 | |
Debian | =11.0 | |
Red Hat Enterprise Linux | =9.0 | |
redhat enterprise Linux eus | =9.2 | |
redhat enterprise Linux eus | =9.4 | |
redhat enterprise Linux for arm 64 | =9.0 | |
redhat enterprise Linux for arm 64 | =9.2_aarch64 | |
redhat enterprise Linux for arm 64 | =9.4_aarch64 | |
Red Hat Enterprise Linux for ARM64 EUS | =9.4_aarch64 | |
redhat enterprise Linux for ibm z systems | =9.0 | |
redhat enterprise Linux for ibm z systems | =9.2_s390x | |
redhat enterprise Linux for ibm z systems | =9.4_s390x | |
redhat enterprise Linux for ibm z systems eus | =9.4_s390x | |
redhat enterprise Linux for power little endian | =9.0 | |
redhat enterprise Linux for power little endian eus | =9.2_ppc64le | |
redhat enterprise Linux for power little endian eus | =9.4_ppc64le | |
redhat enterprise Linux server aus | =9.2 | |
redhat enterprise Linux server aus | =9.4 | |
redhat enterprise Linux server for power little endian update services for sap solutions | =9.2_ppc64le | |
redhat enterprise Linux server update services for sap solutions | =9.2 | |
Red Hat Enterprise Linux for SAP Solutions | =9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24806 has a medium severity rating due to improper input validation when setting malformed OIDs.
To fix CVE-2022-24806, users should upgrade to a version of net-snmp that is higher than 5.9.2.
CVE-2022-24806 affects versions of net-snmp up to and including 5.9.2 and specific versions of Fedora and Debian Linux.
The potential impacts of CVE-2022-24806 include system instability or unauthorized access due to improper input handling.
Currently, there are no effective workarounds for CVE-2022-24806 other than upgrading to a secure version.