Lucene search

K
debianDebianDEBIAN:DSA-5209-1:08E42
HistoryAug 16, 2022 - 8:06 p.m.

[SECURITY] [DSA 5209-1] net-snmp security update

2022-08-1620:06:51
lists.debian.org
22
net-snmp
debian
security update
cve-2022-24805
cve-2022-24806
cve-2022-24807
denial of service
arbitrary code
bullseye
package upgrade

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

8.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.0%


Debian Security Advisory DSA-5209-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
August 16, 2022 https://www.debian.org/security/faq


Package : net-snmp
CVE ID : CVE-2022-24805 CVE-2022-24806 CVE-2022-24807 CVE-2022-24808
CVE-2022-24809 CVE-2022-24810
Debian Bug : 1016139

Yu Zhang and Nanyu Zhong discovered several vulnerabilities in net-snmp,
a suite of Simple Network Management Protocol applications, which could
result in denial of service or the execution of arbitrary code.

For the stable distribution (bullseye), these problems have been fixed in
version 5.9+dfsg-4+deb11u1.

We recommend that you upgrade your net-snmp packages.

For the detailed security status of net-snmp please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/net-snmp

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

8.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.0%