Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2022-24805

Published: 8 July 2022

net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the `INDEX` of `NET-SNMP-VACM-MIB` can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.

Priority

Medium

Status

Package Release Status
net-snmp
Launchpad, Ubuntu, Debian
bionic
Released (5.7.3+dfsg-1.8ubuntu3.7)
focal
Released (5.8+dfsg-2ubuntu2.4)
impish Ignored
(end of life)
jammy
Released (5.9.1+dfsg-1ubuntu2.2)
kinetic
Released (5.9.1+dfsg-4ubuntu2)
trusty
Released (5.7.2~dfsg-8.1ubuntu3.3+esm3)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
upstream
Released (5.9.2)
xenial
Released (5.7.3+dfsg-1ubuntu4.6+esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
Patches:
upstream: https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937
upstream: https://github.com/net-snmp/net-snmp/commit/9a0cd7c00947d5e1c6ceb54558d454f87c3b8341