Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2022-24806

Published: 8 July 2022

net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can exploit an Improper Input Validation vulnerability when SETing malformed OIDs in master agent and subagent simultaneously. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.

Notes

AuthorNote
mdeslaur
same commits as CVE-2022-24805

Priority

Medium

Status

Package Release Status
net-snmp
Launchpad, Ubuntu, Debian
bionic
Released (5.7.3+dfsg-1.8ubuntu3.7)
focal
Released (5.8+dfsg-2ubuntu2.4)
impish Ignored
(end of life)
jammy
Released (5.9.1+dfsg-1ubuntu2.2)
kinetic
Released (5.9.1+dfsg-4ubuntu2)
trusty
Released (5.7.2~dfsg-8.1ubuntu3.3+esm3)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
upstream
Released (5.9.2)
xenial
Released (5.7.3+dfsg-1ubuntu4.6+esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
Patches:
upstream: https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937
upstream: https://github.com/net-snmp/net-snmp/commit/9a0cd7c00947d5e1c6ceb54558d454f87c3b8341