First published: Thu Jul 07 2022(Updated: )
<a href="https://github.com/net-snmp/net-snmp/blob/v5.9.2/CHANGES">https://github.com/net-snmp/net-snmp/blob/v5.9.2/CHANGES</a> <a href="https://access.redhat.com/security/cve/CVE-2022-24808">CVE-2022-24808</a> A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/net-snmp | <5.9.2 | 5.9.2 |
Net-SNMP | <5.9.2 | |
Fedora | =36 | |
Debian | =10.0 | |
Debian | =11.0 | |
Red Hat Enterprise Linux | =9.0 | |
redhat enterprise Linux eus | =9.2 | |
redhat enterprise Linux eus | =9.4 | |
redhat enterprise Linux for arm 64 | =9.0 | |
redhat enterprise Linux for arm 64 | =9.2_aarch64 | |
redhat enterprise Linux for arm 64 | =9.4_aarch64 | |
Red Hat Enterprise Linux for ARM64 EUS | =9.4_aarch64 | |
redhat enterprise Linux for ibm z systems | =9.0 | |
redhat enterprise Linux for ibm z systems | =9.2_s390x | |
redhat enterprise Linux for ibm z systems | =9.4_s390x | |
redhat enterprise Linux for ibm z systems eus | =9.4_s390x | |
redhat enterprise Linux for power little endian | =9.0 | |
redhat enterprise Linux for power little endian eus | =9.2_ppc64le | |
redhat enterprise Linux for power little endian eus | =9.4_ppc64le | |
redhat enterprise Linux server aus | =9.2 | |
redhat enterprise Linux server aus | =9.4 | |
redhat enterprise Linux server for power little endian update services for sap solutions | =9.2_ppc64le | |
redhat enterprise Linux server update services for sap solutions | =9.2 | |
Red Hat Enterprise Linux for SAP Solutions | =9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-24808 is classified as a high-severity vulnerability.
To fix CVE-2022-24808, update to net-snmp version 5.9.2 or later.
CVE-2022-24808 can lead to a denial of service due to a malformed OID in a SET request.
CVE-2022-24808 affects versions of net-snmp prior to 5.9.2.
Disabling the NET-SNMP-AGENT-MIB or limiting access to the SNMP agent can mitigate risks until a patch is applied.