First published: Thu Jul 07 2022(Updated: )
<a href="https://github.com/net-snmp/net-snmp/blob/v5.9.2/CHANGES">https://github.com/net-snmp/net-snmp/blob/v5.9.2/CHANGES</a> <a href="https://access.redhat.com/security/cve/CVE-2022-24810">CVE-2022-24810</a> A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/net-snmp | <5.9.2 | 5.9.2 |
CentOS net-snmp-libs | <5.9.2 | |
Debian | =10.0 | |
Fedora | =36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-24810 is rated as high due to the potential for denial of service.
To fix CVE-2022-24810, upgrade to Net-SNMP version 5.9.2 or later.
Versions of Net-SNMP prior to 5.9.2 are affected by CVE-2022-24810.
CVE-2022-24810 impacts systems running affected versions of Net-SNMP across various distributions including Red Hat and Debian.
A workaround for CVE-2022-24810 is to restrict access to the affected services, if immediate patching is not feasible.