Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-24805 (GCVE-0-2022-24805)
Vulnerability from cvelistv5 – Published: 2024-04-16 19:37 – Updated: 2024-08-03 04:20- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "net-snmp",
"vendor": "net-snmp",
"versions": [
{
"lessThan": "5.9.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-24805",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-04-23T20:41:49.079548Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:15:56.050Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-03T04:20:50.538Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775"
},
{
"tags": [
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103225"
},
{
"tags": [
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105238"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202210-29"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.debian.org/security/2022/dsa-5209"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "net-snmp",
"repo": "https://github.com/net-snmp/net-snmp",
"vendor": "net-snmp",
"versions": [
{
"lessThan": "5.9.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the `INDEX` of `NET-SNMP-VACM-MIB` can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\u003cbr\u003e"
}
],
"value": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the `INDEX` of `NET-SNMP-VACM-MIB` can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-120",
"description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-16T19:37:40.051Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"url": "https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103225"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105238"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/"
},
{
"url": "https://security.gentoo.org/glsa/202210-29"
},
{
"url": "https://www.debian.org/security/2022/dsa-5209"
},
{
"url": "https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "net-snmp: A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access.",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2022-24805",
"datePublished": "2024-04-16T19:37:40.051Z",
"dateReserved": "2022-02-10T16:41:34.916Z",
"dateUpdated": "2024-08-03T04:20:50.538Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2022-24805\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-04-16T20:15:07.600\",\"lastModified\":\"2025-01-17T16:04:56.537\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the `INDEX` of `NET-SNMP-VACM-MIB` can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\\n\"},{\"lang\":\"es\",\"value\":\"net-snmp proporciona varias herramientas relacionadas con el protocolo simple de administraci\u00f3n de red. Antes de la versi\u00f3n 5.9.2, un desbordamiento del b\u00fafer en el manejo del `INDEX` de `NET-SNMP-VACM-MIB` puede provocar un acceso a la memoria fuera de los l\u00edmites. Un usuario con credenciales de s\u00f3lo lectura puede aprovechar el problema. La versi\u00f3n 5.9.2 contiene un parche. Los usuarios deben utilizar credenciales SNMPv3 seguras y evitar compartirlas. Aquellos que deben utilizar SNMPv1 o SNMPv2c deben utilizar una cadena de comunidad compleja y mejorar la protecci\u00f3n restringiendo el acceso a un rango de direcciones IP determinado.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-120\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-120\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.9.2\",\"matchCriteriaId\":\"79AD3D1F-9090-4939-8C82-E676C8C0FBC7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F6FB57C-2BC7-487C-96DD-132683AEB35D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C74F6FA-FA6C-4648-9079-91446E45EE47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B03506D7-0FCD-47B7-90F6-DDEEB5C5A733\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B528C5D-0F72-4685-8516-257597E94AE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.2_aarch64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D85E0DBA-A856-472A-8271-A4F37C35F952\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.4_aarch64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBF70805-7EBF-4731-83DB-D71F7A646B0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01363FFA-F7A6-43FC-8D47-E67F95410095\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D650BFB9-4FDC-4311-8D7E-D981C8F4FA3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.2_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E068ABB-31C2-416E-974A-95E07A2BAB0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.4_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"069180B4-BA50-4AD0-8BA9-83F8005E58BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F843B777-5C64-4CAE-80D6-89DC2C9515B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35EEDB95-DCD1-4FED-9BBB-877B2062410C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99952557-C766-4B9E-8BF5-DBBA194349FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC3CBA5D-9E5D-4C46-B37E-7BB35BE8DADB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F32CA554-F9D7-425B-8F1C-89678507F28C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39D345D3-108A-4551-A112-5EE51991411A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.2_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC6A25CB-907A-4D05-8460-A2488938A8BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC7D8E93-D4BE-46E7-BDE7-843BF8A33162\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18B7F648-9A31-4EE5-A215-C860616A4AB7\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2103225\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2105238\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Product\"]},{\"url\":\"https://security.gentoo.org/glsa/202210-29\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5209\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2103225\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2105238\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\"]},{\"url\":\"https://security.gentoo.org/glsa/202210-29\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5209\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2103225\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2105238\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.gentoo.org/glsa/202210-29\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.debian.org/security/2022/dsa-5209\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T04:20:50.538Z\"}}, {\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-24805\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-04-23T20:41:49.079548Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:*\"], \"vendor\": \"net-snmp\", \"product\": \"net-snmp\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"5.9.2\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-04-23T20:42:35.477Z\"}, \"title\": \"CISA ADP Vulnrichment\"}], \"cna\": {\"title\": \"net-snmp: A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access.\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"repo\": \"https://github.com/net-snmp/net-snmp\", \"vendor\": \"net-snmp\", \"product\": \"net-snmp\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"5.9.2\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2103225\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2105238\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/\"}, {\"url\": \"https://security.gentoo.org/glsa/202210-29\"}, {\"url\": \"https://www.debian.org/security/2022/dsa-5209\"}, {\"url\": \"https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the `INDEX` of `NET-SNMP-VACM-MIB` can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the `INDEX` of `NET-SNMP-VACM-MIB` can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-120\", \"description\": \"CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-04-16T19:37:40.051Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-24805\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-03T04:20:50.538Z\", \"dateReserved\": \"2022-02-10T16:41:34.916Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-04-16T19:37:40.051Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2023-AVI-0318
Vulnerability from certfr_avis - Published: 2023-04-17 - Updated: 2023-04-17
De multiples vulnérabilités ont été découvertes dans VMware. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | Isolation Segment versions 2.12.x antérieures à 2.12.19 | ||
| VMware | Tanzu | VMware Tanzu Application Service for VMs versions 2.12.x antérieures à 2.12.24 | ||
| VMware | N/A | Canonical Ubuntu 18.04 | ||
| VMware | Tanzu | VMware Tanzu Application Service for VMs versions 2.13.x antérieures à 2.13.17 | ||
| VMware | N/A | Platform Automation Toolkit versions 4.0.x antérieures à to 4.0.13 | ||
| VMware | Tanzu | VMware Tanzu Application Service for VMs versions 2.11.x antérieures à 2.11.35 | ||
| VMware | N/A | Platform Automation Toolkit versions 4.3.x versions antérieures à 4.3.5 | ||
| VMware | N/A | Platform Automation Toolkit versions 5.1.x versions antérieures à 5.1.0 | ||
| VMware | N/A | Operations Manager versions 3.0.x antérieures à 3.0.4 | ||
| VMware | N/A | Operations Manager versions 2.10.x antérieures à 2.10.51 | ||
| VMware | N/A | Isolation Segment versions 3.0.x antérieures à 3.0.7 (avec Jammy Stemcells versions antérieures à 1.80) | ||
| VMware | N/A | Isolation Segment versions 2.11.x antérieures à 2.11.29 | ||
| VMware | N/A | Platform Automation Toolkit versions 4.2.x antérieures à 4.2.8 | ||
| VMware | N/A | Canonical Ubuntu 16.04 | ||
| VMware | N/A | Platform Automation Toolkit versions 4.4.x versions antérieures à 4.4.30 | ||
| VMware | N/A | Canonical Ubuntu 22.04 | ||
| VMware | Tanzu | VMware Tanzu Application Service for VMs versions 3.0.x antérieures à 3.0.7 (avec Jammy Stemcells versions 1.80) | ||
| VMware | N/A | Platform Automation Toolkit versions 5.0.x versions antérieures à 5.0.23 | ||
| VMware | N/A | Isolation Segment versions 2.13.x antérieures à 2.13.14 | ||
| VMware | Tanzu | Tanzu Greenplum for Kubernetes versions antérieures à 1.4.0 | ||
| VMware | N/A | Platform Automation Toolkit versions 4.1.x antérieures à 4.1.13 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Isolation Segment versions 2.12.x ant\u00e9rieures \u00e0 2.12.19",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu Application Service for VMs versions 2.12.x ant\u00e9rieures \u00e0 2.12.24",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Canonical Ubuntu 18.04",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu Application Service for VMs versions 2.13.x ant\u00e9rieures \u00e0 2.13.17",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions 4.0.x ant\u00e9rieures \u00e0 to 4.0.13",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu Application Service for VMs versions 2.11.x ant\u00e9rieures \u00e0 2.11.35",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions 4.3.x versions ant\u00e9rieures \u00e0 4.3.5",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions 5.1.x versions ant\u00e9rieures \u00e0 5.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Operations Manager versions 3.0.x ant\u00e9rieures \u00e0 3.0.4",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Operations Manager versions 2.10.x ant\u00e9rieures \u00e0 2.10.51",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segment versions 3.0.x ant\u00e9rieures \u00e0 3.0.7 (avec Jammy Stemcells versions ant\u00e9rieures \u00e0 1.80)",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segment versions 2.11.x ant\u00e9rieures \u00e0 2.11.29",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions 4.2.x ant\u00e9rieures \u00e0 4.2.8",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Canonical Ubuntu 16.04",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions 4.4.x versions ant\u00e9rieures \u00e0 4.4.30",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Canonical Ubuntu 22.04",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu Application Service for VMs versions 3.0.x ant\u00e9rieures \u00e0 3.0.7 (avec Jammy Stemcells versions 1.80)",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions 5.0.x versions ant\u00e9rieures \u00e0 5.0.23",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segment versions 2.13.x ant\u00e9rieures \u00e0 2.13.14",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum for Kubernetes versions ant\u00e9rieures \u00e0 1.4.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions 4.1.x ant\u00e9rieures \u00e0 4.1.13",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-24809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24809"
},
{
"name": "CVE-2022-47629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47629"
},
{
"name": "CVE-2022-24805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24805"
},
{
"name": "CVE-2022-44792",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44792"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2022-4883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4883"
},
{
"name": "CVE-2022-44793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44793"
},
{
"name": "CVE-2022-3165",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3165"
},
{
"name": "CVE-2022-0417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0417"
},
{
"name": "CVE-2022-24807",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24807"
},
{
"name": "CVE-2022-24810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24810"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2022-44617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44617"
},
{
"name": "CVE-2021-3682",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3682"
},
{
"name": "CVE-2021-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23222"
},
{
"name": "CVE-2022-2962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2962"
},
{
"name": "CVE-2023-22809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22809"
},
{
"name": "CVE-2022-0392",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0392"
},
{
"name": "CVE-2022-33070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33070"
},
{
"name": "CVE-2022-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0216"
},
{
"name": "CVE-2022-40898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40898"
},
{
"name": "CVE-2022-24806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24806"
},
{
"name": "CVE-2022-46285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46285"
},
{
"name": "CVE-2021-3930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3930"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2022-24808",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24808"
},
{
"name": "CVE-2021-3750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3750"
}
],
"initial_release_date": "2023-04-17T00:00:00",
"last_revision_date": "2023-04-17T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0318",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-04-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eVMware\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de\nprivil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5795-1 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5787-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5795-2 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5787-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5787-2 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5772-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5765-1 du 13 avril 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5821-1 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5821-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5801-1 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5795-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5811-1 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5811-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5787-1 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5767-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5806-1 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5801-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5807-1 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5807-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5787-1 du 12 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5765-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5806-2 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5806-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5772-1 du 13 avril 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5767-1 du 13 avril 2023",
"url": null
}
]
}
CERTFR-2026-AVI-0408
Vulnerability from certfr_avis - Published: 2026-04-09 - Updated: 2026-04-09
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Junos OS versions 24.2 antérieures à 24.2R2-S4 sur SRX Series et MX Series | ||
| Juniper Networks | N/A | Junos OS versions 24.4R2 antérieures à 24.4R2-S3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 23.4-EVO antérieures à 23.4R2-S8-EVO | ||
| Juniper Networks | N/A | Junos OS versions 22.4 antérieures à 22.4R3-S9 sur SRX Series | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.4R3 antérieures à 22.4R3-S8-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 21.2R3-S8-EVO sur PTX10004, PTX10008, PTX100016 avec JNP10K-LC1201 ou JNP10K-LC1202 | ||
| Juniper Networks | N/A | Junos OS versions 24.4R1 antérieures à 24.4R1-S3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 24.4R1-EVO antérieures à 24.4R1-S3-EVO | ||
| Juniper Networks | N/A | Junos OS versions 21.4 antérieures à 21.4R3-S12 sur SRX Series | ||
| Juniper Networks | N/A | Junos OS Evolved versions 21.4-EVO antérieures à 21.4R3-S7-EVO sur PTX10004, PTX10008, PTX100016 avec JNP10K-LC1201 ou JNP10K-LC1202 | ||
| Juniper Networks | N/A | Junos OS versions 23.4 antérieures à 23.4R2-S7 | ||
| Juniper Networks | N/A | Junos OS versions 24.2 antérieures à 24.2R2-S3 sur SRX Series | ||
| Juniper Networks | N/A | Junos OS versions antérieures à 23.2R2-S6 sur SRX Series et MX Series | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.3-EVO antérieures à 22.3R3-S3-EVO sur PTX10004, PTX10008, PTX100016 avec JNP10K-LC1201 ou JNP10K-LC1202 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.4R3 antérieures à 22.4R3-S9-EVO sur PTX Series | ||
| Juniper Networks | N/A | Junos OS versions 23.4 antérieures à 23.4R2-S7 sur SRX Series | ||
| Juniper Networks | N/A | Junos OS versions 25.2R2 antérieures à 25.2R2 | ||
| Juniper Networks | N/A | Junos OS versions 25.2R1 antérieures à 25.2R1-S2 | ||
| Juniper Networks | N/A | Junos OS versions antérieures à 23.4R2-S7 sur SRX Series et MX Series | ||
| Juniper Networks | N/A | Junos OS versions 24.2R2 antérieures à 24.2R2-S4 | ||
| Juniper Networks | N/A | Junos OS versions 23.2 antérieures à 23.2R2-S6 sur SRX Series | ||
| Juniper Networks | N/A | Junos OS Evolved versions 25.2R2-EVO antérieures à 25.2R2-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions 24.2-EVO antérieures à 24.2R2-S4-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.4-EVO antérieures à 22.4R3-S2-EVO sur PTX10004, PTX10008, PTX100016 avec JNP10K-LC1201 ou JNP10K-LC1202 | ||
| Juniper Networks | N/A | Junos OS versions 21.2R3 antérieures à 21.2R3-S10 sur SRX Series | ||
| Juniper Networks | N/A | Junos OS versions 22.4 antérieures à 22.4R3-S9 sur SRX Series et MX Series | ||
| Juniper Networks | N/A | Junos OS versions 25.2 antérieures à 25.2R2 sur SRX Series et MX Series | ||
| Juniper Networks | N/A | Junos OS Evolved versions 23.2-EVO antérieures à 23.2R2-S5-EVO | ||
| Juniper Networks | N/A | Junos OS versions 23.2R2 antérieures à 23.2R2-S7 | ||
| Juniper Networks | N/A | JSI vLWC versions antérieures à 3.0.94 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 23.2-EVO antérieures à 23.2R2-S6-EVO sur PTX Series | ||
| Juniper Networks | N/A | Junos OS Evolved versions 23.2-EVO antérieures à 23.2R2-EVO sur PTX10004, PTX10008, PTX100016 avec JNP10K-LC1201 ou JNP10K-LC1202 | ||
| Juniper Networks | N/A | Junos OS versions 22.2 antérieures à 22.2R3-S8 sur SRX Series | ||
| Juniper Networks | N/A | Junos OS versions 22.4R3 antérieures à 22.4R3-S9 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 25.2R1-EVO antérieures à 25.2R1-S2-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions 24.4R2-EVO antérieures à 24.4R2-S3-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.2-EVO antérieures à 22.2R3-S4-EVO sur PTX10004, PTX10008, PTX100016 avec JNP10K-LC1201 ou JNP10K-LC1202 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos OS versions 24.2 ant\u00e9rieures \u00e0 24.2R2-S4 sur SRX Series et MX Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 24.4R2 ant\u00e9rieures \u00e0 24.4R2-S3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R2-S8-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 22.4 ant\u00e9rieures \u00e0 22.4R3-S9 sur SRX Series ",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.4R3 ant\u00e9rieures \u00e0 22.4R3-S8-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 21.2R3-S8-EVO sur PTX10004, PTX10008, PTX100016 avec JNP10K-LC1201 ou JNP10K-LC1202",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 24.4R1 ant\u00e9rieures \u00e0 24.4R1-S3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 24.4R1-EVO ant\u00e9rieures \u00e0 24.4R1-S3-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S12 sur SRX Series ",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 21.4-EVO ant\u00e9rieures \u00e0 21.4R3-S7-EVO sur PTX10004, PTX10008, PTX100016 avec JNP10K-LC1201 ou JNP10K-LC1202",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 23.4 ant\u00e9rieures \u00e0 23.4R2-S7",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 24.2 ant\u00e9rieures \u00e0 24.2R2-S3 sur SRX Series ",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 23.2R2-S6 sur SRX Series et MX Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.3-EVO ant\u00e9rieures \u00e0 22.3R3-S3-EVO sur PTX10004, PTX10008, PTX100016 avec JNP10K-LC1201 ou JNP10K-LC1202",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.4R3 ant\u00e9rieures \u00e0 22.4R3-S9-EVO sur PTX Series ",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 23.4 ant\u00e9rieures \u00e0 23.4R2-S7 sur SRX Series ",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 25.2R2 ant\u00e9rieures \u00e0 25.2R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 25.2R1 ant\u00e9rieures \u00e0 25.2R1-S2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 23.4R2-S7 sur SRX Series et MX Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 24.2R2 ant\u00e9rieures \u00e0 24.2R2-S4",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 23.2 ant\u00e9rieures \u00e0 23.2R2-S6 sur SRX Series ",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 25.2R2-EVO ant\u00e9rieures \u00e0 25.2R2-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 24.2-EVO ant\u00e9rieures \u00e0 24.2R2-S4-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.4-EVO ant\u00e9rieures \u00e0 22.4R3-S2-EVO sur PTX10004, PTX10008, PTX100016 avec JNP10K-LC1201 ou JNP10K-LC1202",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 21.2R3 ant\u00e9rieures \u00e0 21.2R3-S10 sur SRX Series ",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 22.4 ant\u00e9rieures \u00e0 22.4R3-S9 sur SRX Series et MX Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 25.2 ant\u00e9rieures \u00e0 25.2R2 sur SRX Series et MX Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 23.2-EVO ant\u00e9rieures \u00e0 23.2R2-S5-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 23.2R2 ant\u00e9rieures \u00e0 23.2R2-S7",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": " JSI vLWC versions ant\u00e9rieures \u00e0 3.0.94",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 23.2-EVO ant\u00e9rieures \u00e0 23.2R2-S6-EVO sur PTX Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 23.2-EVO ant\u00e9rieures \u00e0 23.2R2-EVO sur PTX10004, PTX10008, PTX100016 avec JNP10K-LC1201 ou JNP10K-LC1202",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S8 sur SRX Series ",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 22.4R3 ant\u00e9rieures \u00e0 22.4R3-S9",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 25.2R1-EVO ant\u00e9rieures \u00e0 25.2R1-S2-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 24.4R2-EVO ant\u00e9rieures \u00e0 24.4R2-S3-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.2-EVO ant\u00e9rieures \u00e0 22.2R3-S4-EVO sur PTX10004, PTX10008, PTX100016 avec JNP10K-LC1201 ou JNP10K-LC1202",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-33773",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33773"
},
{
"name": "CVE-2026-33785",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33785"
},
{
"name": "CVE-2026-33780",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33780"
},
{
"name": "CVE-2022-24805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24805"
},
{
"name": "CVE-2026-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21919"
},
{
"name": "CVE-2026-33771",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33771"
},
{
"name": "CVE-2025-30650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30650"
},
{
"name": "CVE-2026-33797",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33797"
},
{
"name": "CVE-2026-33779",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33779"
},
{
"name": "CVE-2025-13914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13914"
},
{
"name": "CVE-2026-33784",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33784"
},
{
"name": "CVE-2026-33786",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33786"
},
{
"name": "CVE-2026-33776",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33776"
},
{
"name": "CVE-2026-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21916"
},
{
"name": "CVE-2026-33781",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33781"
},
{
"name": "CVE-2026-33787",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33787"
},
{
"name": "CVE-2026-33778",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33778"
},
{
"name": "CVE-2026-33791",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33791"
},
{
"name": "CVE-2026-33790",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33790"
},
{
"name": "CVE-2026-33783",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33783"
},
{
"name": "CVE-2026-33774",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33774"
},
{
"name": "CVE-2026-33775",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33775"
},
{
"name": "CVE-2026-33788",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33788"
},
{
"name": "CVE-2026-33782",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33782"
},
{
"name": "CVE-2026-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21915"
}
],
"initial_release_date": "2026-04-09T00:00:00",
"last_revision_date": "2026-04-09T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0408",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-04-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks",
"vendor_advisories": [
{
"published_at": "2026-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA107868",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-SRX-Series-MX-Series-When-a-specifically-malformed-first-ISAKMP-packet-is-received-kmd-iked-crashes-CVE-2026-33778"
},
{
"published_at": "2026-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA107864",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-CTP-OS-Configuring-password-requirements-does-not-work-which-permits-the-use-of-weak-passwords-CVE-2026-33771"
},
{
"published_at": "2026-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA107863",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-Privileged-local-user-can-gain-access-to-a-Linux-based-FPC-as-root-CVE-2025-30650"
},
{
"published_at": "2026-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA107823",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-SRX-Series-Insufficient-certificate-verification-for-device-to-SD-cloud-communication-CVE-2026-33779"
},
{
"published_at": "2026-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA107822",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-CVE-2022-24805-resolved-in-net-SNMP"
},
{
"published_at": "2026-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA107872",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-MX-Series-Missing-Authorization-for-specific-request-CLI-commands-in-a-JDM-CSDS-scenario-CVE-2026-33785"
},
{
"published_at": "2026-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA107869",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-EX-Series-QFX-Series-In-a-VXLAN-scenario-when-specific-control-protocol-packets-are-received-memory-leaks-and-eventually-no-traffic-is-passed-CVE-2026-33781"
},
{
"published_at": "2026-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA107821",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-MX-Series-Mismatch-between-configured-and-received-packet-types-causes-memory-leak-in-bbe-smgd-CVE-2026-33775"
},
{
"published_at": "2026-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA107865",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-MX-Series-Firewall-filters-on-lo0-non-0-in-the-default-routing-instance-are-not-in-effect-CVE-2026-33774"
},
{
"published_at": "2026-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA107810",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-SRX1600-SRX2300-SRX4300-When-a-specific-show-command-is-executed-chassisd-crashes-CVE-2026-33786"
},
{
"published_at": "2026-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA107871",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-vLWC-Default-password-is-not-required-to-be-changed-which-allows-unauthorized-high-privileged-access-CVE-2026-33784"
},
{
"published_at": "2026-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA107820",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-MX-Series-In-specific-DHCPv6-scenarios-jdhcpd-memory-increases-continuously-with-subscriber-logouts-CVE-2026-33782"
},
{
"published_at": "2026-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA107815",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-EX-Series-QFX-Series-If-the-same-egress-filter-is-configured-on-both-an-IRB-and-a-physical-interface-one-of-those-is-not-applied-CVE-2026-33773"
},
{
"published_at": "2026-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA106019",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-high-frequency-of-connecting-and-disconnecting-netconf-sessions-causes-management-unavailability-CVE-2026-21919"
},
{
"published_at": "2026-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA107850",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-attacker-sending-a-specific-genuine-BGP-packet-causes-a-BGP-reset-CVE-2026-33797"
},
{
"published_at": "2026-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA107866",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Specific-low-privileged-CLI-command-exposes-sensitive-information-CVE-2026-33776"
},
{
"published_at": "2026-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA107873",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-SRX1500-SRX4100-SRX4200-SRX4600-When-a-specific-show-command-is-executed-chassisd-crashes-CVE-2026-33787"
},
{
"published_at": "2026-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA107874",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-SRX-Series-In-a-NAT64-configuration-receipt-of-a-specific-malformed-ICMPv6-packet-will-cause-the-srxpfe-process-to-crash-and-restart-CVE-2026-33790"
},
{
"published_at": "2026-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA107875",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Execution-of-crafted-CLI-commands-allows-for-arbitrary-shell-injection-as-root-CVE-2026-33791"
},
{
"published_at": "2026-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA107807",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-A-low-privileged-user-can-escalate-their-privileges-so-that-they-can-login-as-root-CVE-2026-21916"
},
{
"published_at": "2026-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA107806",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-Evolved-Local-authenticated-attackers-can-gain-access-to-FPCs-CVE-2026-33788"
},
{
"published_at": "2026-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA106016",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-JSI-Virtual-Lightweight-Collector-Shell-escape-allows-privilege-escalation-to-root-CVE-2026-21915"
},
{
"published_at": "2026-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA107819",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-an-EVPN-MPLS-scenario-churn-of-ESI-routes-causes-a-memory-leak-in-l2ald-CVE-2026-33780"
},
{
"published_at": "2026-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA107862",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Apstra-SSH-host-key-validation-vulnerability-for-managed-devices-CVE-2025-13914"
},
{
"published_at": "2026-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA107870",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-Evolved-PTX-Series-If-SRTE-tunnels-provisioned-via-PCEP-are-present-and-specific-gRPC-queries-are-received-evo-aftman-crashes-CVE-2026-33783"
}
]
}
CERTFR-2025-AVI-0018
Vulnerability from certfr_avis - Published: 2025-01-09 - Updated: 2025-01-09
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos OS | Junos OS versions 22.4.x antérieures à 22.4R3-S5 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 24.1R2 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 21.2R3-S9-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 23.4.x-EVO antérieures à 23.4R2-S3-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions 24.2.x antérieures à 24.2R1-S2 et 24.2R2 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 23.2.x-EVO antérieures à 23.2R2-S3-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 21.4.x-EVO antérieures à 21.4R3-S10-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 22.4.x-EVO antérieures à 22.4R3-S5-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions 22.2.x antérieures à 22.2R3-S5 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 22.3.x-EVO antérieures à 22.3R3-S4-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 24.2.x-EVO antérieures à 24.2R1-S2-EVO et 24.2R2-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions 22.3.x antérieures à 22.3R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS versions 23.4.x antérieures à 23.4R2-S3 | ||
| Juniper Networks | Junos OS | Junos OS versions 21.4.x antérieures à 21.4R3-S10 | ||
| Juniper Networks | Junos OS | Junos OS versions 23.2.x antérieures à 23.2R2-S3 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 21.2R3-S9 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 22.2.x-EVO antérieures à 22.2R3-S5-EVO |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos OS versions 22.4.x ant\u00e9rieures \u00e0 22.4R3-S5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 24.1R2",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 21.2R3-S9-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 23.4.x-EVO ant\u00e9rieures \u00e0 23.4R2-S3-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 24.2.x ant\u00e9rieures \u00e0 24.2R1-S2 et 24.2R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 23.2.x-EVO ant\u00e9rieures \u00e0 23.2R2-S3-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 21.4.x-EVO ant\u00e9rieures \u00e0 21.4R3-S10-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.4.x-EVO ant\u00e9rieures \u00e0 22.4R3-S5-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 22.2.x ant\u00e9rieures \u00e0 22.2R3-S5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.3.x-EVO ant\u00e9rieures \u00e0 22.3R3-S4-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 24.2.x-EVO ant\u00e9rieures \u00e0 24.2R1-S2-EVO et 24.2R2-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 22.3.x ant\u00e9rieures \u00e0 22.3R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 23.4.x ant\u00e9rieures \u00e0 23.4R2-S3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 21.4.x ant\u00e9rieures \u00e0 21.4R3-S10",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 23.2.x ant\u00e9rieures \u00e0 23.2R2-S3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 21.2R3-S9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.2.x-EVO ant\u00e9rieures \u00e0 22.2R3-S5-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-35875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35875"
},
{
"name": "CVE-2024-35797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35797"
},
{
"name": "CVE-2024-26886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26886"
},
{
"name": "CVE-2023-52801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52801"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2024-26629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26629"
},
{
"name": "CVE-2025-21592",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21592"
},
{
"name": "CVE-2022-24809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24809"
},
{
"name": "CVE-2025-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21599"
},
{
"name": "CVE-2024-35791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35791"
},
{
"name": "CVE-2023-3019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3019"
},
{
"name": "CVE-2022-24805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24805"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-36883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36883"
},
{
"name": "CVE-2023-3255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3255"
},
{
"name": "CVE-2024-26946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26946"
},
{
"name": "CVE-2024-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26720"
},
{
"name": "CVE-2023-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4408"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2022-24807",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24807"
},
{
"name": "CVE-2024-39894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39894"
},
{
"name": "CVE-2023-6240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6240"
},
{
"name": "CVE-2023-6683",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6683"
},
{
"name": "CVE-2024-42131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42131"
},
{
"name": "CVE-2024-1488",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1488"
},
{
"name": "CVE-2022-24810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24810"
},
{
"name": "CVE-2024-26630",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26630"
},
{
"name": "CVE-2023-5517",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5517"
},
{
"name": "CVE-2024-41073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41073"
},
{
"name": "CVE-2025-21600",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21600"
},
{
"name": "CVE-2024-42082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42082"
},
{
"name": "CVE-2025-21596",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21596"
},
{
"name": "CVE-2024-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32462"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2025-21602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21602"
},
{
"name": "CVE-2024-25742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25742"
},
{
"name": "CVE-2024-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25743"
},
{
"name": "CVE-2024-42096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42096"
},
{
"name": "CVE-2024-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38619"
},
{
"name": "CVE-2025-21593",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21593"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-36019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36019"
},
{
"name": "CVE-2024-41040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41040"
},
{
"name": "CVE-2020-11022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-40927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40927"
},
{
"name": "CVE-2024-41055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41055"
},
{
"name": "CVE-2023-50387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
},
{
"name": "CVE-2024-42102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42102"
},
{
"name": "CVE-2025-21598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21598"
},
{
"name": "CVE-2024-40936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40936"
},
{
"name": "CVE-2006-5051",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-5051"
},
{
"name": "CVE-2024-41096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41096"
},
{
"name": "CVE-2023-6516",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6516"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2024-41044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41044"
},
{
"name": "CVE-2024-38559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38559"
},
{
"name": "CVE-2024-6387",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6387"
},
{
"name": "CVE-2022-24806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24806"
},
{
"name": "CVE-2024-36979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36979"
},
{
"name": "CVE-2023-52463",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52463"
},
{
"name": "CVE-2024-36000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
},
{
"name": "CVE-2023-5679",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5679"
},
{
"name": "CVE-2023-5088",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5088"
},
{
"name": "CVE-2023-42467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42467"
},
{
"name": "CVE-2022-24808",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24808"
}
],
"initial_release_date": "2025-01-09T00:00:00",
"last_revision_date": "2025-01-09T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0018",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-01-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks",
"vendor_advisories": [
{
"published_at": "2025-01-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-21593",
"url": "https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-On-SRv6-enabled-devices-an-attacker-sending-a-malformed-BGP-update-can-cause-the-rpd-to-crash-CVE-2025-21593"
},
{
"published_at": "2025-01-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-21602",
"url": "https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-specially-crafted-BGP-update-packet-causes-RPD-crash-CVE-2025-21602"
},
{
"published_at": "2025-01-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks 2025-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R2-release",
"url": "https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R2-release"
},
{
"published_at": "2025-01-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks 2025-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-in-OpenSSH",
"url": "https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-in-OpenSSH"
},
{
"published_at": "2025-01-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-21598",
"url": "https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-BGP-traceoptions-are-configured-receipt-of-malformed-BGP-packets-causes-RPD-to-crash-CVE-2025-21598"
},
{
"published_at": "2025-01-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-21592",
"url": "https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-OS-SRX-Series-Low-privileged-user-able-to-access-highly-sensitive-information-on-file-system-CVE-2025-21592"
},
{
"published_at": "2025-01-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-21599",
"url": "https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-OS-Evolved-Receipt-of-specifically-malformed-IPv6-packets-causes-kernel-memory-exhaustion-leading-to-Denial-of-Service-CVE-2025-21599"
},
{
"published_at": "2025-01-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-21600",
"url": "https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-With-certain-BGP-options-enabled-receipt-of-specifically-malformed-BGP-update-causes-RPD-crash-CVE-2025-21600"
},
{
"published_at": "2025-01-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-21596",
"url": "https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-OS-SRX1500-SRX4100-SRX4200-Execution-of-low-privileged-CLI-command-results-in-chassisd-crash-CVE-2025-21596"
}
]
}
CERTFR-2024-AVI-0809
Vulnerability from certfr_avis - Published: 2024-09-25 - Updated: 2024-09-25
De multiples vulnérabilités ont été découvertes dans les produits Citrix. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Citrix | XenServer | XenServer 8 sans les derniers correctifs de sécurité | ||
| Citrix | Citrix Hypervisor | Citrix Hypervisor versions antérieures à 8.2 CU1 LTSR avec le correctif de sécurité XS82ECU1077 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "XenServer 8 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix Hypervisor versions ant\u00e9rieures \u00e0 8.2 CU1 LTSR avec le correctif de s\u00e9curit\u00e9 XS82ECU1077",
"product": {
"name": "Citrix Hypervisor",
"vendor": {
"name": "Citrix",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-24809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24809"
},
{
"name": "CVE-2022-24805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24805"
},
{
"name": "CVE-2024-45817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45817"
}
],
"initial_release_date": "2024-09-25T00:00:00",
"last_revision_date": "2024-09-25T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0809",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-09-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Citrix. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Citrix",
"vendor_advisories": [
{
"published_at": "2024-09-24",
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX691646",
"url": "https://support.citrix.com/s/article/CTX691646-xenserver-and-citrix-hypervisor-security-update-for-cve202445817"
}
]
}
CERTFR-2025-AVI-0855
Vulnerability from certfr_avis - Published: 2025-10-09 - Updated: 2025-10-09
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos OS | Junos OS versions 24.4 antérieures à 24.4R2 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 22.4R3-S8-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions 23.4 antérieures à 23.4R2-S5 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 23.2-EVO antérieures à 23.2R2-S4-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 22.4R3-S8 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 24.2-EVO antérieures à 24.2R2-S2-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 24.4-EVO antérieures à 24.4R2-EVO | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 24.1R4 | ||
| Juniper Networks | Security Director | Security Director Policy Enforcer versions antérieures à 23.1R1 Hotpatch v3 | ||
| Juniper Networks | Junos Space | Junos Space Security Director versions antérieures à 24.1R4 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 23.4-EVO antérieures à 23.4R2-S5-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions 23.2 antérieures à 23.2R2-S4 | ||
| Juniper Networks | Junos OS | Junos OS versions 24.2 antérieures à 24.2R2-S1 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos OS versions 24.4 ant\u00e9rieures \u00e0 24.4R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 22.4R3-S8-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 23.4 ant\u00e9rieures \u00e0 23.4R2-S5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 23.2-EVO ant\u00e9rieures \u00e0 23.2R2-S4-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 22.4R3-S8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 24.2-EVO ant\u00e9rieures \u00e0 24.2R2-S2-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 24.4-EVO ant\u00e9rieures \u00e0 24.4R2-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 24.1R4",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Security Director Policy Enforcer versions ant\u00e9rieures \u00e0 23.1R1 Hotpatch v3",
"product": {
"name": "Security Director",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space Security Director versions ant\u00e9rieures \u00e0 24.1R4",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R2-S5-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 23.2 ant\u00e9rieures \u00e0 23.2R2-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 24.2 ant\u00e9rieures \u00e0 24.2R2-S1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-24795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24795"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2023-44431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44431"
},
{
"name": "CVE-2021-47606",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47606"
},
{
"name": "CVE-2025-59993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59993"
},
{
"name": "CVE-2025-59997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59997"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2025-59995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59995"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2023-28466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28466"
},
{
"name": "CVE-2024-36921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
},
{
"name": "CVE-2025-59986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59986"
},
{
"name": "CVE-2025-60009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60009"
},
{
"name": "CVE-2025-59989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59989"
},
{
"name": "CVE-2024-26897",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26897"
},
{
"name": "CVE-2023-46103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46103"
},
{
"name": "CVE-2024-27052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27052"
},
{
"name": "CVE-2023-2235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2235"
},
{
"name": "CVE-2025-59999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59999"
},
{
"name": "CVE-2025-59994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59994"
},
{
"name": "CVE-2024-4076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4076"
},
{
"name": "CVE-2025-59967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59967"
},
{
"name": "CVE-2022-24805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24805"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2023-3390",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3390"
},
{
"name": "CVE-2024-37356",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37356"
},
{
"name": "CVE-2024-47538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47538"
},
{
"name": "CVE-2023-4004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4004"
},
{
"name": "CVE-2024-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21823"
},
{
"name": "CVE-2025-59991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59991"
},
{
"name": "CVE-2024-5564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5564"
},
{
"name": "CVE-2024-26600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26600"
},
{
"name": "CVE-2023-28746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28746"
},
{
"name": "CVE-2023-52864",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52864"
},
{
"name": "CVE-2025-26600",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26600"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2024-36929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36929"
},
{
"name": "CVE-2023-35788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35788"
},
{
"name": "CVE-2025-59982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59982"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2023-43785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43785"
},
{
"name": "CVE-2024-30205",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30205"
},
{
"name": "CVE-2018-17247",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17247"
},
{
"name": "CVE-2025-60004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60004"
},
{
"name": "CVE-2023-51594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51594"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2023-50229",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50229"
},
{
"name": "CVE-2025-59974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59974"
},
{
"name": "CVE-2025-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26598"
},
{
"name": "CVE-2018-3824",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3824"
},
{
"name": "CVE-2024-40928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40928"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2024-36020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36020"
},
{
"name": "CVE-2021-45105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
},
{
"name": "CVE-2025-59981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59981"
},
{
"name": "CVE-2023-31248",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31248"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2021-4104",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4104"
},
{
"name": "CVE-2024-30203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30203"
},
{
"name": "CVE-2023-3090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3090"
},
{
"name": "CVE-2024-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
},
{
"name": "CVE-2025-59968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59968"
},
{
"name": "CVE-2023-51592",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51592"
},
{
"name": "CVE-2025-59990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59990"
},
{
"name": "CVE-2021-22146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22146"
},
{
"name": "CVE-2025-59978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59978"
},
{
"name": "CVE-2024-25629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
},
{
"name": "CVE-2024-36017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36017"
},
{
"name": "CVE-2024-24806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24806"
},
{
"name": "CVE-2024-27434",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27434"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2024-35852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35852"
},
{
"name": "CVE-2024-38558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38558"
},
{
"name": "CVE-2025-59992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59992"
},
{
"name": "CVE-2024-35845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35845"
},
{
"name": "CVE-2021-41072",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41072"
},
{
"name": "CVE-2025-60000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60000"
},
{
"name": "CVE-2022-24807",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24807"
},
{
"name": "CVE-2024-47607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47607"
},
{
"name": "CVE-2024-27065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27065"
},
{
"name": "CVE-2024-36005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36005"
},
{
"name": "CVE-2023-45866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45866"
},
{
"name": "CVE-2023-27349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27349"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2015-5377",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5377"
},
{
"name": "CVE-2023-48161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48161"
},
{
"name": "CVE-2022-24810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24810"
},
{
"name": "CVE-2024-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33621"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2025-60001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60001"
},
{
"name": "CVE-2024-5742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5742"
},
{
"name": "CVE-2023-50230",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50230"
},
{
"name": "CVE-2025-52960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52960"
},
{
"name": "CVE-2024-36922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36922"
},
{
"name": "CVE-2025-59996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59996"
},
{
"name": "CVE-2024-39487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2023-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38575"
},
{
"name": "CVE-2024-35911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35911"
},
{
"name": "CVE-2025-59957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59957"
},
{
"name": "CVE-2025-59958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59958"
},
{
"name": "CVE-2021-41043",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41043"
},
{
"name": "CVE-2018-17244",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17244"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-26597",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26597"
},
{
"name": "CVE-2024-36971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36971"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2023-3776",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3776"
},
{
"name": "CVE-2024-42934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42934"
},
{
"name": "CVE-2023-51580",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51580"
},
{
"name": "CVE-2024-35848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35848"
},
{
"name": "CVE-2024-27417",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27417"
},
{
"name": "CVE-2023-21102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21102"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-59983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59983"
},
{
"name": "CVE-2024-36941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36941"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2024-35969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35969"
},
{
"name": "CVE-2021-45046",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45046"
},
{
"name": "CVE-2025-60006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60006"
},
{
"name": "CVE-2024-36489",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36489"
},
{
"name": "CVE-2015-1427",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1427"
},
{
"name": "CVE-2024-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38575"
},
{
"name": "CVE-2024-35899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35899"
},
{
"name": "CVE-2024-35823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35823"
},
{
"name": "CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"name": "CVE-2024-9632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9632"
},
{
"name": "CVE-2023-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38408"
},
{
"name": "CVE-2025-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26595"
},
{
"name": "CVE-2024-26868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26868"
},
{
"name": "CVE-2023-43787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43787"
},
{
"name": "CVE-2023-43786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43786"
},
{
"name": "CVE-2024-8235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8235"
},
{
"name": "CVE-2023-4147",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4147"
},
{
"name": "CVE-2025-59977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59977"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2023-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3610"
},
{
"name": "CVE-2025-26596",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26596"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2022-48622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48622"
},
{
"name": "CVE-2021-42550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42550"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2024-26828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26828"
},
{
"name": "CVE-2025-59998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59998"
},
{
"name": "CVE-2024-26808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26808"
},
{
"name": "CVE-2024-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30204"
},
{
"name": "CVE-2025-60002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60002"
},
{
"name": "CVE-2023-35001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35001"
},
{
"name": "CVE-2024-27282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27282"
},
{
"name": "CVE-2018-3831",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3831"
},
{
"name": "CVE-2023-43490",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43490"
},
{
"name": "CVE-2025-59976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59976"
},
{
"name": "CVE-2025-59980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59980"
},
{
"name": "CVE-2025-26599",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26599"
},
{
"name": "CVE-2024-47615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47615"
},
{
"name": "CVE-2018-3823",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3823"
},
{
"name": "CVE-2023-22655",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22655"
},
{
"name": "CVE-2024-6126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6126"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2023-39368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39368"
},
{
"name": "CVE-2021-44832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
},
{
"name": "CVE-2024-26853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26853"
},
{
"name": "CVE-2025-59975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59975"
},
{
"name": "CVE-2025-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0624"
},
{
"name": "CVE-2025-59987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59987"
},
{
"name": "CVE-2024-40958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40958"
},
{
"name": "CVE-2018-3826",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3826"
},
{
"name": "CVE-2025-26601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26601"
},
{
"name": "CVE-2024-52337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52337"
},
{
"name": "CVE-2025-59985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59985"
},
{
"name": "CVE-2025-11198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11198"
},
{
"name": "CVE-2022-24806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24806"
},
{
"name": "CVE-2023-32233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32233"
},
{
"name": "CVE-2024-35789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35789"
},
{
"name": "CVE-2024-26327",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26327"
},
{
"name": "CVE-2015-3253",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3253"
},
{
"name": "CVE-2025-59964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59964"
},
{
"name": "CVE-2025-59988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59988"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2023-45733",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45733"
},
{
"name": "CVE-2021-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40153"
},
{
"name": "CVE-2024-6655",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6655"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2024-27049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27049"
},
{
"name": "CVE-2025-59984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59984"
},
{
"name": "CVE-2025-52961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52961"
},
{
"name": "CVE-2023-51589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51589"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2021-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3903"
},
{
"name": "CVE-2024-35800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35800"
},
{
"name": "CVE-2023-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2124"
},
{
"name": "CVE-2023-51596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51596"
},
{
"name": "CVE-2025-60010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60010"
},
{
"name": "CVE-2023-51764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51764"
},
{
"name": "CVE-2025-26594",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26594"
},
{
"name": "CVE-2024-6409",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6409"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2022-24808",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24808"
},
{
"name": "CVE-2025-59962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59962"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2024-40961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40961"
}
],
"initial_release_date": "2025-10-09T00:00:00",
"last_revision_date": "2025-10-09T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0855",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks",
"vendor_advisories": [
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103140",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Multiple-XSS-vulnerabilities-resolved-in-24-1R4-release"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103141",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R4-release"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103163",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-Evolved-Multiple-OS-command-injection-vulnerabilities-fixed-CVE-2025-60006"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103168",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Device-allows-login-for-user-with-expired-password-CVE-2025-60010"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103171",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Reflected-client-side-HTTP-parameter-pollution-vulnerability-in-web-interface-CVE-2025-59977"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103167",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-When-a-user-with-the-name-ftp-or-anonymous-is-configured-unauthenticated-filesystem-access-is-allowed-CVE-2025-59980"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103156",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-Evolved-ACX7024-ACX7024X-ACX7100-32C-ACX7100-48L-ACX7348-ACX7509-When-specific-valid-multicast-traffic-is-received-on-the-L3-interface-a-vulnerable-device-evo-pfemand-crashes-and-restarts-CVE-2025-59967"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103437",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Security-Director-Policy-Enforcer-An-unrestricted-API-allows-a-network-based-unauthenticated-attacker-to-deploy-malicious-vSRX-images-to-VMWare-NSX-Server-CVE-2025-11198"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103172",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Flooding-device-with-inbound-API-calls-leads-to-WebUI-and-CLI-management-access-DoS-CVE-2025-59975"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103157",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Juniper-Security-Director-Insufficient-authorization-for-sensitive-resources-in-web-interface-CVE-2025-59968"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103170",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Arbitrary-file-download-vulnerability-in-web-interface-CVE-2025-59976"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103139",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Security-Director-Multiple-vulnerabilities-resolved-in-24-1R4"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103151",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-With-BGP-sharding-enabled-change-in-indirect-next-hop-can-cause-RPD-crash-CVE-2025-59962"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103153",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-SRX4700-When-forwarding-options-sampling-is-enabled-any-traffic-destined-to-the-RE-will-cause-the-forwarding-line-card-to-crash-and-restart-CVE-2025-59964"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103147",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-Evolved-PTX-Series-When-firewall-filter-rejects-traffic-these-packets-are-erroneously-sent-to-the-RE-CVE-2025-59958"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103144",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-Evolved-PTX-Series-except-PTX10003-An-unauthenticated-adjacent-attacker-sending-specific-valid-traffic-can-cause-a-memory-leak-in-cfmman-leading-to-FPC-crash-and-restart-CVE-2025-52961"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103143",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-Receipt-of-specific-SIP-packets-in-a-high-utilization-situation-causes-a-flowd-crash-CVE-2025-52960"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103146",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-EX4600-Series-and-QFX5000-Series-An-attacker-with-physical-access-can-open-a-persistent-backdoor-CVE-2025-59957"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103138",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Security-Director-Multiple-vulnerabilities-resolved-in-24-1R4-by-upgrading-Log4j-Java-library-to-2-23-1-and-ElasticSearch-to-6-8-17"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103165",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Specific-BGP-EVPN-update-message-causes-rpd-crash-CVE-2025-60004"
}
]
}
GSD-2022-24805
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-24805",
"id": "GSD-2022-24805",
"references": [
"https://www.suse.com/security/cve/CVE-2022-24805.html",
"https://www.debian.org/security/2022/dsa-5209",
"https://ubuntu.com/security/CVE-2022-24805",
"https://advisories.mageia.org/CVE-2022-24805.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-24805"
],
"details": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the `INDEX` of `NET-SNMP-VACM-MIB` can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n",
"id": "GSD-2022-24805",
"modified": "2023-12-13T01:19:43.039943Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2022-24805",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "net-snmp",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "0",
"version_value": "5.9.2"
}
]
}
}
]
},
"vendor_name": "net-snmp"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the `INDEX` of `NET-SNMP-VACM-MIB` can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-120",
"lang": "eng",
"value": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775",
"refsource": "MISC",
"url": "https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2103225",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103225"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2105238",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105238"
},
{
"name": "https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html",
"refsource": "MISC",
"url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/",
"refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/"
},
{
"name": "https://security.gentoo.org/glsa/202210-29",
"refsource": "MISC",
"url": "https://security.gentoo.org/glsa/202210-29"
},
{
"name": "https://www.debian.org/security/2022/dsa-5209",
"refsource": "MISC",
"url": "https://www.debian.org/security/2022/dsa-5209"
},
{
"name": "https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937",
"refsource": "MISC",
"url": "https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937"
}
]
},
"source": {
"discovery": "UNKNOWN"
}
},
"nvd.nist.gov": {
"cve": {
"descriptions": [
{
"lang": "en",
"value": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the `INDEX` of `NET-SNMP-VACM-MIB` can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n"
},
{
"lang": "es",
"value": "net-snmp proporciona varias herramientas relacionadas con el protocolo simple de administraci\u00f3n de red. Antes de la versi\u00f3n 5.9.2, un desbordamiento del b\u00fafer en el manejo del `INDEX` de `NET-SNMP-VACM-MIB` puede provocar un acceso a la memoria fuera de los l\u00edmites. Un usuario con credenciales de s\u00f3lo lectura puede aprovechar el problema. La versi\u00f3n 5.9.2 contiene un parche. Los usuarios deben utilizar credenciales SNMPv3 seguras y evitar compartirlas. Aquellos que deben utilizar SNMPv1 o SNMPv2c deben utilizar una cadena de comunidad compleja y mejorar la protecci\u00f3n restringiendo el acceso a un rango de direcciones IP determinado."
}
],
"id": "CVE-2022-24805",
"lastModified": "2024-04-17T12:48:31.863",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2024-04-16T20:15:07.600",
"references": [
{
"source": "security-advisories@github.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103225"
},
{
"source": "security-advisories@github.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105238"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775"
},
{
"source": "security-advisories@github.com",
"url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html"
},
{
"source": "security-advisories@github.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/"
},
{
"source": "security-advisories@github.com",
"url": "https://security.gentoo.org/glsa/202210-29"
},
{
"source": "security-advisories@github.com",
"url": "https://www.debian.org/security/2022/dsa-5209"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-120"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
}
}
}
SUSE-SU-2022:4205-1
Vulnerability from csaf_suse - Published: 2022-11-23 16:35 - Updated: 2022-11-23 16:35| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for net-snmp",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for net-snmp fixes the following issues:\n\n Updated to version 5.9.3 (bsc#1201103, jsc#SLE-11203):\n\n - CVE-2022-24805: Fixed a buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB that can cause an out-of-bounds memory access.\n - CVE-2022-24809: Fixed a malformed OID in a GET-NEXT to the nsVacmAccessTable that can cause a NULL pointer dereference.\n - CVE-2022-24806: Fixed an improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously.\n - CVE-2022-24807: Fixed a malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access.\n - CVE-2022-24808: Fixed a malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference.\n - CVE-2022-24810: Fixed a malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4205,SUSE-SLE-Module-Basesystem-15-SP3-2022-4205,SUSE-SLE-Module-Basesystem-15-SP4-2022-4205,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-4205,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-4205,openSUSE-SLE-15.3-2022-4205,openSUSE-SLE-15.4-2022-4205,openSUSE-SLE-15.5-2022-4205",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4205-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4205-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224205-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4205-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013097.html"
},
{
"category": "self",
"summary": "SUSE Bug 1201103",
"url": "https://bugzilla.suse.com/1201103"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-24805 page",
"url": "https://www.suse.com/security/cve/CVE-2022-24805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-24806 page",
"url": "https://www.suse.com/security/cve/CVE-2022-24806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-24807 page",
"url": "https://www.suse.com/security/cve/CVE-2022-24807/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-24808 page",
"url": "https://www.suse.com/security/cve/CVE-2022-24808/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-24809 page",
"url": "https://www.suse.com/security/cve/CVE-2022-24809/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-24810 page",
"url": "https://www.suse.com/security/cve/CVE-2022-24810/"
}
],
"title": "Security update for net-snmp",
"tracking": {
"current_release_date": "2022-11-23T16:35:05Z",
"generator": {
"date": "2022-11-23T16:35:05Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4205-1",
"initial_release_date": "2022-11-23T16:35:05Z",
"revision_history": [
{
"date": "2022-11-23T16:35:05Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libsnmp40-5.9.3-150300.15.3.1.aarch64",
"product": {
"name": "libsnmp40-5.9.3-150300.15.3.1.aarch64",
"product_id": "libsnmp40-5.9.3-150300.15.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "net-snmp-5.9.3-150300.15.3.1.aarch64",
"product": {
"name": "net-snmp-5.9.3-150300.15.3.1.aarch64",
"product_id": "net-snmp-5.9.3-150300.15.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"product": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"product_id": "net-snmp-devel-5.9.3-150300.15.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"product": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"product_id": "perl-SNMP-5.9.3-150300.15.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "python2-net-snmp-5.9.3-150300.15.3.1.aarch64",
"product": {
"name": "python2-net-snmp-5.9.3-150300.15.3.1.aarch64",
"product_id": "python2-net-snmp-5.9.3-150300.15.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"product": {
"name": "python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"product_id": "python3-net-snmp-5.9.3-150300.15.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"product": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"product_id": "snmp-mibs-5.9.3-150300.15.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libsnmp40-64bit-5.9.3-150300.15.3.1.aarch64_ilp32",
"product": {
"name": "libsnmp40-64bit-5.9.3-150300.15.3.1.aarch64_ilp32",
"product_id": "libsnmp40-64bit-5.9.3-150300.15.3.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-64bit-5.9.3-150300.15.3.1.aarch64_ilp32",
"product": {
"name": "net-snmp-devel-64bit-5.9.3-150300.15.3.1.aarch64_ilp32",
"product_id": "net-snmp-devel-64bit-5.9.3-150300.15.3.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libsnmp40-5.9.3-150300.15.3.1.i586",
"product": {
"name": "libsnmp40-5.9.3-150300.15.3.1.i586",
"product_id": "libsnmp40-5.9.3-150300.15.3.1.i586"
}
},
{
"category": "product_version",
"name": "net-snmp-5.9.3-150300.15.3.1.i586",
"product": {
"name": "net-snmp-5.9.3-150300.15.3.1.i586",
"product_id": "net-snmp-5.9.3-150300.15.3.1.i586"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.9.3-150300.15.3.1.i586",
"product": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.i586",
"product_id": "net-snmp-devel-5.9.3-150300.15.3.1.i586"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.9.3-150300.15.3.1.i586",
"product": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.i586",
"product_id": "perl-SNMP-5.9.3-150300.15.3.1.i586"
}
},
{
"category": "product_version",
"name": "python2-net-snmp-5.9.3-150300.15.3.1.i586",
"product": {
"name": "python2-net-snmp-5.9.3-150300.15.3.1.i586",
"product_id": "python2-net-snmp-5.9.3-150300.15.3.1.i586"
}
},
{
"category": "product_version",
"name": "python3-net-snmp-5.9.3-150300.15.3.1.i586",
"product": {
"name": "python3-net-snmp-5.9.3-150300.15.3.1.i586",
"product_id": "python3-net-snmp-5.9.3-150300.15.3.1.i586"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.9.3-150300.15.3.1.i586",
"product": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.i586",
"product_id": "snmp-mibs-5.9.3-150300.15.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"product": {
"name": "libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"product_id": "libsnmp40-5.9.3-150300.15.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "net-snmp-5.9.3-150300.15.3.1.ppc64le",
"product": {
"name": "net-snmp-5.9.3-150300.15.3.1.ppc64le",
"product_id": "net-snmp-5.9.3-150300.15.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"product": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"product_id": "net-snmp-devel-5.9.3-150300.15.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"product": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"product_id": "perl-SNMP-5.9.3-150300.15.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python2-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"product": {
"name": "python2-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"product_id": "python2-net-snmp-5.9.3-150300.15.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"product": {
"name": "python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"product_id": "python3-net-snmp-5.9.3-150300.15.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"product": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"product_id": "snmp-mibs-5.9.3-150300.15.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libsnmp40-5.9.3-150300.15.3.1.s390x",
"product": {
"name": "libsnmp40-5.9.3-150300.15.3.1.s390x",
"product_id": "libsnmp40-5.9.3-150300.15.3.1.s390x"
}
},
{
"category": "product_version",
"name": "net-snmp-5.9.3-150300.15.3.1.s390x",
"product": {
"name": "net-snmp-5.9.3-150300.15.3.1.s390x",
"product_id": "net-snmp-5.9.3-150300.15.3.1.s390x"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"product": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"product_id": "net-snmp-devel-5.9.3-150300.15.3.1.s390x"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.9.3-150300.15.3.1.s390x",
"product": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.s390x",
"product_id": "perl-SNMP-5.9.3-150300.15.3.1.s390x"
}
},
{
"category": "product_version",
"name": "python2-net-snmp-5.9.3-150300.15.3.1.s390x",
"product": {
"name": "python2-net-snmp-5.9.3-150300.15.3.1.s390x",
"product_id": "python2-net-snmp-5.9.3-150300.15.3.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"product": {
"name": "python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"product_id": "python3-net-snmp-5.9.3-150300.15.3.1.s390x"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.9.3-150300.15.3.1.s390x",
"product": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.s390x",
"product_id": "snmp-mibs-5.9.3-150300.15.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libsnmp40-5.9.3-150300.15.3.1.x86_64",
"product": {
"name": "libsnmp40-5.9.3-150300.15.3.1.x86_64",
"product_id": "libsnmp40-5.9.3-150300.15.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"product": {
"name": "libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"product_id": "libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "net-snmp-5.9.3-150300.15.3.1.x86_64",
"product": {
"name": "net-snmp-5.9.3-150300.15.3.1.x86_64",
"product_id": "net-snmp-5.9.3-150300.15.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"product": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"product_id": "net-snmp-devel-5.9.3-150300.15.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"product": {
"name": "net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"product_id": "net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"product": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"product_id": "perl-SNMP-5.9.3-150300.15.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "python2-net-snmp-5.9.3-150300.15.3.1.x86_64",
"product": {
"name": "python2-net-snmp-5.9.3-150300.15.3.1.x86_64",
"product_id": "python2-net-snmp-5.9.3-150300.15.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"product": {
"name": "python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"product_id": "python3-net-snmp-5.9.3-150300.15.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"product": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"product_id": "snmp-mibs-5.9.3-150300.15.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15:sp4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.3-150300.15.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "libsnmp40-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.3-150300.15.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.ppc64le"
},
"product_reference": "libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.3-150300.15.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "libsnmp40-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.3-150300.15.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "libsnmp40-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.3-150300.15.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "net-snmp-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.3-150300.15.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.ppc64le"
},
"product_reference": "net-snmp-5.9.3-150300.15.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.3-150300.15.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "net-snmp-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.3-150300.15.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "net-snmp-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le"
},
"product_reference": "net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le"
},
"product_reference": "perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "perl-SNMP-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le"
},
"product_reference": "snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "snmp-mibs-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.3-150300.15.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "libsnmp40-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.3-150300.15.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.ppc64le"
},
"product_reference": "libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.3-150300.15.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "libsnmp40-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.3-150300.15.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "libsnmp40-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.3-150300.15.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "net-snmp-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.3-150300.15.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.ppc64le"
},
"product_reference": "net-snmp-5.9.3-150300.15.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.3-150300.15.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "net-snmp-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.3-150300.15.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "net-snmp-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le"
},
"product_reference": "net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le"
},
"product_reference": "perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "perl-SNMP-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le"
},
"product_reference": "snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "snmp-mibs-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.3-150300.15.3.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "libsnmp40-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.3-150300.15.3.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.ppc64le"
},
"product_reference": "libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.3-150300.15.3.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "libsnmp40-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.3-150300.15.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "libsnmp40-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.3-150300.15.3.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "net-snmp-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.3-150300.15.3.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.ppc64le"
},
"product_reference": "net-snmp-5.9.3-150300.15.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.3-150300.15.3.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "net-snmp-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.3-150300.15.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "net-snmp-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le"
},
"product_reference": "net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le"
},
"product_reference": "perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "perl-SNMP-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-net-snmp-5.9.3-150300.15.3.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "python2-net-snmp-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-net-snmp-5.9.3-150300.15.3.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.ppc64le"
},
"product_reference": "python2-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-net-snmp-5.9.3-150300.15.3.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "python2-net-snmp-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-net-snmp-5.9.3-150300.15.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "python2-net-snmp-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-5.9.3-150300.15.3.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-5.9.3-150300.15.3.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le"
},
"product_reference": "python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-5.9.3-150300.15.3.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-5.9.3-150300.15.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le"
},
"product_reference": "snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "snmp-mibs-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.3-150300.15.3.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "libsnmp40-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.3-150300.15.3.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.ppc64le"
},
"product_reference": "libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.3-150300.15.3.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "libsnmp40-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.3-150300.15.3.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "libsnmp40-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.3-150300.15.3.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "net-snmp-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.3-150300.15.3.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.ppc64le"
},
"product_reference": "net-snmp-5.9.3-150300.15.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.3-150300.15.3.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "net-snmp-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.3-150300.15.3.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "net-snmp-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le"
},
"product_reference": "net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le"
},
"product_reference": "perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "perl-SNMP-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-5.9.3-150300.15.3.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-5.9.3-150300.15.3.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le"
},
"product_reference": "python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-5.9.3-150300.15.3.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-5.9.3-150300.15.3.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le"
},
"product_reference": "snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "snmp-mibs-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.3-150300.15.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "net-snmp-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.3-150300.15.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.ppc64le"
},
"product_reference": "net-snmp-5.9.3-150300.15.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.3-150300.15.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "net-snmp-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.3-150300.15.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "net-snmp-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le"
},
"product_reference": "net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.ppc64le"
},
"product_reference": "perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "perl-SNMP-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-5.9.3-150300.15.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-5.9.3-150300.15.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le"
},
"product_reference": "python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-5.9.3-150300.15.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-5.9.3-150300.15.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.ppc64le"
},
"product_reference": "snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "snmp-mibs-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-24805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-24805"
}
],
"notes": [
{
"category": "general",
"text": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the `INDEX` of `NET-SNMP-VACM-MIB` can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-24805",
"url": "https://www.suse.com/security/cve/CVE-2022-24805"
},
{
"category": "external",
"summary": "SUSE Bug 1201103 for CVE-2022-24805",
"url": "https://bugzilla.suse.com/1201103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-23T16:35:05Z",
"details": "moderate"
}
],
"title": "CVE-2022-24805"
},
{
"cve": "CVE-2022-24806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-24806"
}
],
"notes": [
{
"category": "general",
"text": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can exploit an Improper Input Validation vulnerability when SETing malformed OIDs in master agent and subagent simultaneously. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-24806",
"url": "https://www.suse.com/security/cve/CVE-2022-24806"
},
{
"category": "external",
"summary": "SUSE Bug 1201103 for CVE-2022-24806",
"url": "https://bugzilla.suse.com/1201103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-23T16:35:05Z",
"details": "moderate"
}
],
"title": "CVE-2022-24806"
},
{
"cve": "CVE-2022-24807",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-24807"
}
],
"notes": [
{
"category": "general",
"text": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a malformed OID in a SET request to `SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable` can cause an out-of-bounds memory access. A user with read-write credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-24807",
"url": "https://www.suse.com/security/cve/CVE-2022-24807"
},
{
"category": "external",
"summary": "SUSE Bug 1201103 for CVE-2022-24807",
"url": "https://bugzilla.suse.com/1201103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-23T16:35:05Z",
"details": "moderate"
}
],
"title": "CVE-2022-24807"
},
{
"cve": "CVE-2022-24808",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-24808"
}
],
"notes": [
{
"category": "general",
"text": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can use a malformed OID in a `SET` request to `NET-SNMP-AGENT-MIB::nsLogTable` to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-24808",
"url": "https://www.suse.com/security/cve/CVE-2022-24808"
},
{
"category": "external",
"summary": "SUSE Bug 1201103 for CVE-2022-24808",
"url": "https://bugzilla.suse.com/1201103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-23T16:35:05Z",
"details": "moderate"
}
],
"title": "CVE-2022-24808"
},
{
"cve": "CVE-2022-24809",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-24809"
}
],
"notes": [
{
"category": "general",
"text": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-only credentials can use a malformed OID in a `GET-NEXT` to the `nsVacmAccessTable` to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-24809",
"url": "https://www.suse.com/security/cve/CVE-2022-24809"
},
{
"category": "external",
"summary": "SUSE Bug 1201103 for CVE-2022-24809",
"url": "https://bugzilla.suse.com/1201103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-23T16:35:05Z",
"details": "moderate"
}
],
"title": "CVE-2022-24809"
},
{
"cve": "CVE-2022-24810",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-24810"
}
],
"notes": [
{
"category": "general",
"text": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can use a malformed OID in a SET to the nsVacmAccessTable to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-24810",
"url": "https://www.suse.com/security/cve/CVE-2022-24810"
},
{
"category": "external",
"summary": "SUSE Bug 1201103 for CVE-2022-24810",
"url": "https://bugzilla.suse.com/1201103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python2-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"openSUSE Leap 15.5:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-23T16:35:05Z",
"details": "moderate"
}
],
"title": "CVE-2022-24810"
}
]
}
SUSE-RU-2024:0029-1
Vulnerability from csaf_suse - Published: 2024-01-04 10:21 - Updated: 2024-01-04 10:21| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Recommended update for net-snmp",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for net-snmp fixes the following issues:\n\nUpdate to net-snmp-5.9.4 (bsc#1214364 jsc#PED-6435).\n\n* 5.9.4:\n\n - libsnmp:\n\n - Remove the SNMP_SWIPE_MEM() macro Remove this macro since it is not\n\tused in the Net-SNMP code base.\n - DISPLAY-HINT fixes\n - Miscellanious improvements to the transports\n - Handle multiple oldEngineID configuration lines \n - fixes for DNS names longer than 63 characters\n\n - agent:\n\n - Added a ignoremount configuration option for the HOST-MIB\n - disallow SETs with a NULL varbind\n - fix the --enable-minimalist build\n\n - apps:\n\n - snmpset: allow SET with NULL varbind for testing\n - snmptrapd: improved MySQL logging code\n\n - general:\n\n - configure: Remove -Wno-deprecated as it is no longer needed\n - miscellanious ther bug fixes, build fixes and cleanups\n\n - security:\n\n - These two CVEs can be exploited by a user with read-only credentials:\n\n - CVE-2022-24805A buffer overflow in the handling of the INDEX of\n NET-SNMP-VACM-MIB can cause an out-of-bounds memory access.\n - CVE-2022-24809A malformed OID in a GET-NEXT to the nsVacmAccessTable\n can cause a NULL pointer dereference.\n\n - These CVEs can be exploited by a user with read-write credentials:\n\n - CVE-2022-24806Improper Input Validation when SETing malformed\n OIDs in master agent and subagent simultaneously\n - CVE-2022-24807A malformed OID in a SET request to\n SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an\n out-of-bounds memory access.\n - CVE-2022-24808A malformed OID in a SET request to\n NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference\n - CVE-2022-24810A malformed OID in a SET to the nsVacmAccessTable\n can cause a NULL pointer dereference.\n - To avoid these flaws, use strong SNMPv3 credentials and do not share them.\n If you must use SNMPv1 or SNMPv2c, use a complex community string\n and enhance the protection by restricting access to a given IP address range.\n - Thanks are due toYu Zhang of VARAS@IIE and Nanyu Zhong of VARAS@IIE for\n reporting the following CVEs that have been fixed in this release, and\n to Arista Networks for providing fixes.\n\n - IF-MIB: Update ifTable entries even if the interface name has changed\n At least on Linux a network interface index may be reused for a\n network interface with a different name. Hence this patch that\n enables replacing network interface information even if the network\n interface name has changed.\n\n - unspecified:\n\n - Moved transport code into a separate subdirectory in snmplib\n - Snmplib: remove inline versions of container funcs\u0027.\n\n - misc:\n\n - snmp-create-v3-user: Fix the snmpd.conf path @datadir@ is\n expanded in ${datarootdir} so datarootdir must be set before\n @datadir@ is used.\n\n* 5.9:\n\n - snmplib:\n\n - Add IPv6 support to DTLSUDP transport\n - use new netsnmp_sockaddr_storage in netsnmp_addr_pair\n - add base_transport ptr for tunneled transports\n - Dtls: overhaul of debug\n - Remove inline versions of container funcs\n\n - snmpd:\n\n - Use ETHTOOL_GLINKSETTINGS when available Newer Linux kernels\n\tsupport ETHTOOL_GLINKSETTINGS. Use it when available instead of the\n\tolder and deprecated ETHTOOL_GSET. This patch avoids that the Linux\n\tkernel reports the following kernel warning: warning: \u0027snmpd\u0027 uses\n\tlegacy ethtool link settings API, link modes are only partially\n\treported See also https://sourceforge.net/p/net-snmp/patches/1387/.\n - [BUG 2926]: Make it possible to set agentXPingInterval for a\n\tsubagent - register agentXPingInterval for the subagent list\n\thandler, before it was registered for snmp - added agentxTimeout to\n\tthe subagent list handler. It\u0027s now possible to set for snmpd and\n\tthe subagent. See \u0027man snmpd.conf\u0027 - added agentxRetries to the\n\tsubagent list handler. See \u0027man snmpd.conf\u0027. It\u0027s never used in the\n\tsubagent, but it\u0027s now following the documentation Signed-off-by:\n\tAnders Wallin \u003cwallinux@gmail.com\u003e\n\n - snmptrap:\n\n - BUG: 2899: Patch from Drew Roedersheimer to set library\n\tengineboots/time values before sending\n\n - snmptrapd:\n\n - Add support for the latest libmysqlclient version\n\n - libsnmp:\n\n - Scan MIB directories in alphabetical order This guarantees that\n\te.g. mibs/RFC1213-MIB.txt is read before mibs/SNMPv2-MIB.txt. The\n\torder in which these MIBs is read matters because both define\n\tsysLocation but with different attributes.\n\n\n- Removing legacy MIBs used by Velocity Software (jsc#PED-6416 jsc#PED-6434).\n- Added hardening to systemd service(s) (bsc#1181400, bsc#1206044).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-29,SUSE-SLE-SDK-12-SP5-2024-29,SUSE-SLE-SERVER-12-SP5-2024-29",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-ru-2024_0029-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-RU-2024:0029-1",
"url": "https://www.suse.com/support/update/announcement//suse-ru-20240029-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-RU-2024:0029-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-January/033563.html"
},
{
"category": "self",
"summary": "SUSE Bug 1181400",
"url": "https://bugzilla.suse.com/1181400"
},
{
"category": "self",
"summary": "SUSE Bug 1206044",
"url": "https://bugzilla.suse.com/1206044"
},
{
"category": "self",
"summary": "SUSE Bug 1214364",
"url": "https://bugzilla.suse.com/1214364"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-24805 page",
"url": "https://www.suse.com/security/cve/CVE-2022-24805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-24806 page",
"url": "https://www.suse.com/security/cve/CVE-2022-24806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-24807 page",
"url": "https://www.suse.com/security/cve/CVE-2022-24807/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-24808 page",
"url": "https://www.suse.com/security/cve/CVE-2022-24808/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-24809 page",
"url": "https://www.suse.com/security/cve/CVE-2022-24809/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-24810 page",
"url": "https://www.suse.com/security/cve/CVE-2022-24810/"
}
],
"title": "Recommended update for net-snmp",
"tracking": {
"current_release_date": "2024-01-04T10:21:18Z",
"generator": {
"date": "2024-01-04T10:21:18Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-RU-2024:0029-1",
"initial_release_date": "2024-01-04T10:21:18Z",
"revision_history": [
{
"date": "2024-01-04T10:21:18Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libsnmp40-5.9.4-14.3.1.aarch64",
"product": {
"name": "libsnmp40-5.9.4-14.3.1.aarch64",
"product_id": "libsnmp40-5.9.4-14.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "net-snmp-5.9.4-14.3.1.aarch64",
"product": {
"name": "net-snmp-5.9.4-14.3.1.aarch64",
"product_id": "net-snmp-5.9.4-14.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.9.4-14.3.1.aarch64",
"product": {
"name": "net-snmp-devel-5.9.4-14.3.1.aarch64",
"product_id": "net-snmp-devel-5.9.4-14.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.9.4-14.3.1.aarch64",
"product": {
"name": "perl-SNMP-5.9.4-14.3.1.aarch64",
"product_id": "perl-SNMP-5.9.4-14.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "python2-net-snmp-5.9.4-14.3.1.aarch64",
"product": {
"name": "python2-net-snmp-5.9.4-14.3.1.aarch64",
"product_id": "python2-net-snmp-5.9.4-14.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-net-snmp-5.9.4-14.3.1.aarch64",
"product": {
"name": "python3-net-snmp-5.9.4-14.3.1.aarch64",
"product_id": "python3-net-snmp-5.9.4-14.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.9.4-14.3.1.aarch64",
"product": {
"name": "snmp-mibs-5.9.4-14.3.1.aarch64",
"product_id": "snmp-mibs-5.9.4-14.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libsnmp40-64bit-5.9.4-14.3.1.aarch64_ilp32",
"product": {
"name": "libsnmp40-64bit-5.9.4-14.3.1.aarch64_ilp32",
"product_id": "libsnmp40-64bit-5.9.4-14.3.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-64bit-5.9.4-14.3.1.aarch64_ilp32",
"product": {
"name": "net-snmp-devel-64bit-5.9.4-14.3.1.aarch64_ilp32",
"product_id": "net-snmp-devel-64bit-5.9.4-14.3.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libsnmp40-5.9.4-14.3.1.i586",
"product": {
"name": "libsnmp40-5.9.4-14.3.1.i586",
"product_id": "libsnmp40-5.9.4-14.3.1.i586"
}
},
{
"category": "product_version",
"name": "net-snmp-5.9.4-14.3.1.i586",
"product": {
"name": "net-snmp-5.9.4-14.3.1.i586",
"product_id": "net-snmp-5.9.4-14.3.1.i586"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.9.4-14.3.1.i586",
"product": {
"name": "net-snmp-devel-5.9.4-14.3.1.i586",
"product_id": "net-snmp-devel-5.9.4-14.3.1.i586"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.9.4-14.3.1.i586",
"product": {
"name": "perl-SNMP-5.9.4-14.3.1.i586",
"product_id": "perl-SNMP-5.9.4-14.3.1.i586"
}
},
{
"category": "product_version",
"name": "python2-net-snmp-5.9.4-14.3.1.i586",
"product": {
"name": "python2-net-snmp-5.9.4-14.3.1.i586",
"product_id": "python2-net-snmp-5.9.4-14.3.1.i586"
}
},
{
"category": "product_version",
"name": "python3-net-snmp-5.9.4-14.3.1.i586",
"product": {
"name": "python3-net-snmp-5.9.4-14.3.1.i586",
"product_id": "python3-net-snmp-5.9.4-14.3.1.i586"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.9.4-14.3.1.i586",
"product": {
"name": "snmp-mibs-5.9.4-14.3.1.i586",
"product_id": "snmp-mibs-5.9.4-14.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libsnmp40-5.9.4-14.3.1.ppc64le",
"product": {
"name": "libsnmp40-5.9.4-14.3.1.ppc64le",
"product_id": "libsnmp40-5.9.4-14.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "net-snmp-5.9.4-14.3.1.ppc64le",
"product": {
"name": "net-snmp-5.9.4-14.3.1.ppc64le",
"product_id": "net-snmp-5.9.4-14.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.9.4-14.3.1.ppc64le",
"product": {
"name": "net-snmp-devel-5.9.4-14.3.1.ppc64le",
"product_id": "net-snmp-devel-5.9.4-14.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.9.4-14.3.1.ppc64le",
"product": {
"name": "perl-SNMP-5.9.4-14.3.1.ppc64le",
"product_id": "perl-SNMP-5.9.4-14.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python2-net-snmp-5.9.4-14.3.1.ppc64le",
"product": {
"name": "python2-net-snmp-5.9.4-14.3.1.ppc64le",
"product_id": "python2-net-snmp-5.9.4-14.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-net-snmp-5.9.4-14.3.1.ppc64le",
"product": {
"name": "python3-net-snmp-5.9.4-14.3.1.ppc64le",
"product_id": "python3-net-snmp-5.9.4-14.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.9.4-14.3.1.ppc64le",
"product": {
"name": "snmp-mibs-5.9.4-14.3.1.ppc64le",
"product_id": "snmp-mibs-5.9.4-14.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libsnmp40-5.9.4-14.3.1.s390",
"product": {
"name": "libsnmp40-5.9.4-14.3.1.s390",
"product_id": "libsnmp40-5.9.4-14.3.1.s390"
}
},
{
"category": "product_version",
"name": "net-snmp-5.9.4-14.3.1.s390",
"product": {
"name": "net-snmp-5.9.4-14.3.1.s390",
"product_id": "net-snmp-5.9.4-14.3.1.s390"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.9.4-14.3.1.s390",
"product": {
"name": "net-snmp-devel-5.9.4-14.3.1.s390",
"product_id": "net-snmp-devel-5.9.4-14.3.1.s390"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.9.4-14.3.1.s390",
"product": {
"name": "perl-SNMP-5.9.4-14.3.1.s390",
"product_id": "perl-SNMP-5.9.4-14.3.1.s390"
}
},
{
"category": "product_version",
"name": "python2-net-snmp-5.9.4-14.3.1.s390",
"product": {
"name": "python2-net-snmp-5.9.4-14.3.1.s390",
"product_id": "python2-net-snmp-5.9.4-14.3.1.s390"
}
},
{
"category": "product_version",
"name": "python3-net-snmp-5.9.4-14.3.1.s390",
"product": {
"name": "python3-net-snmp-5.9.4-14.3.1.s390",
"product_id": "python3-net-snmp-5.9.4-14.3.1.s390"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.9.4-14.3.1.s390",
"product": {
"name": "snmp-mibs-5.9.4-14.3.1.s390",
"product_id": "snmp-mibs-5.9.4-14.3.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libsnmp40-5.9.4-14.3.1.s390x",
"product": {
"name": "libsnmp40-5.9.4-14.3.1.s390x",
"product_id": "libsnmp40-5.9.4-14.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libsnmp40-32bit-5.9.4-14.3.1.s390x",
"product": {
"name": "libsnmp40-32bit-5.9.4-14.3.1.s390x",
"product_id": "libsnmp40-32bit-5.9.4-14.3.1.s390x"
}
},
{
"category": "product_version",
"name": "net-snmp-5.9.4-14.3.1.s390x",
"product": {
"name": "net-snmp-5.9.4-14.3.1.s390x",
"product_id": "net-snmp-5.9.4-14.3.1.s390x"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.9.4-14.3.1.s390x",
"product": {
"name": "net-snmp-devel-5.9.4-14.3.1.s390x",
"product_id": "net-snmp-devel-5.9.4-14.3.1.s390x"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-32bit-5.9.4-14.3.1.s390x",
"product": {
"name": "net-snmp-devel-32bit-5.9.4-14.3.1.s390x",
"product_id": "net-snmp-devel-32bit-5.9.4-14.3.1.s390x"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.9.4-14.3.1.s390x",
"product": {
"name": "perl-SNMP-5.9.4-14.3.1.s390x",
"product_id": "perl-SNMP-5.9.4-14.3.1.s390x"
}
},
{
"category": "product_version",
"name": "python2-net-snmp-5.9.4-14.3.1.s390x",
"product": {
"name": "python2-net-snmp-5.9.4-14.3.1.s390x",
"product_id": "python2-net-snmp-5.9.4-14.3.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-net-snmp-5.9.4-14.3.1.s390x",
"product": {
"name": "python3-net-snmp-5.9.4-14.3.1.s390x",
"product_id": "python3-net-snmp-5.9.4-14.3.1.s390x"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.9.4-14.3.1.s390x",
"product": {
"name": "snmp-mibs-5.9.4-14.3.1.s390x",
"product_id": "snmp-mibs-5.9.4-14.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libsnmp40-5.9.4-14.3.1.x86_64",
"product": {
"name": "libsnmp40-5.9.4-14.3.1.x86_64",
"product_id": "libsnmp40-5.9.4-14.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"product": {
"name": "libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"product_id": "libsnmp40-32bit-5.9.4-14.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "net-snmp-5.9.4-14.3.1.x86_64",
"product": {
"name": "net-snmp-5.9.4-14.3.1.x86_64",
"product_id": "net-snmp-5.9.4-14.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.9.4-14.3.1.x86_64",
"product": {
"name": "net-snmp-devel-5.9.4-14.3.1.x86_64",
"product_id": "net-snmp-devel-5.9.4-14.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-32bit-5.9.4-14.3.1.x86_64",
"product": {
"name": "net-snmp-devel-32bit-5.9.4-14.3.1.x86_64",
"product_id": "net-snmp-devel-32bit-5.9.4-14.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.9.4-14.3.1.x86_64",
"product": {
"name": "perl-SNMP-5.9.4-14.3.1.x86_64",
"product_id": "perl-SNMP-5.9.4-14.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "python2-net-snmp-5.9.4-14.3.1.x86_64",
"product": {
"name": "python2-net-snmp-5.9.4-14.3.1.x86_64",
"product_id": "python2-net-snmp-5.9.4-14.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-net-snmp-5.9.4-14.3.1.x86_64",
"product": {
"name": "python3-net-snmp-5.9.4-14.3.1.x86_64",
"product_id": "python3-net-snmp-5.9.4-14.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.9.4-14.3.1.x86_64",
"product": {
"name": "snmp-mibs-5.9.4-14.3.1.x86_64",
"product_id": "snmp-mibs-5.9.4-14.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9.4-14.3.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.aarch64"
},
"product_reference": "net-snmp-devel-5.9.4-14.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9.4-14.3.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.ppc64le"
},
"product_reference": "net-snmp-devel-5.9.4-14.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9.4-14.3.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.s390x"
},
"product_reference": "net-snmp-devel-5.9.4-14.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9.4-14.3.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.x86_64"
},
"product_reference": "net-snmp-devel-5.9.4-14.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.4-14.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64"
},
"product_reference": "libsnmp40-5.9.4-14.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.4-14.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le"
},
"product_reference": "libsnmp40-5.9.4-14.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.4-14.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.s390x"
},
"product_reference": "libsnmp40-5.9.4-14.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.4-14.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64"
},
"product_reference": "libsnmp40-5.9.4-14.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-32bit-5.9.4-14.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x"
},
"product_reference": "libsnmp40-32bit-5.9.4-14.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-32bit-5.9.4-14.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64"
},
"product_reference": "libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.4-14.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.aarch64"
},
"product_reference": "net-snmp-5.9.4-14.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.4-14.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le"
},
"product_reference": "net-snmp-5.9.4-14.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.4-14.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.s390x"
},
"product_reference": "net-snmp-5.9.4-14.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.4-14.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.x86_64"
},
"product_reference": "net-snmp-5.9.4-14.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.4-14.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64"
},
"product_reference": "perl-SNMP-5.9.4-14.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.4-14.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le"
},
"product_reference": "perl-SNMP-5.9.4-14.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.4-14.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x"
},
"product_reference": "perl-SNMP-5.9.4-14.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.4-14.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64"
},
"product_reference": "perl-SNMP-5.9.4-14.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.4-14.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64"
},
"product_reference": "snmp-mibs-5.9.4-14.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.4-14.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le"
},
"product_reference": "snmp-mibs-5.9.4-14.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.4-14.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x"
},
"product_reference": "snmp-mibs-5.9.4-14.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.4-14.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64"
},
"product_reference": "snmp-mibs-5.9.4-14.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.4-14.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64"
},
"product_reference": "libsnmp40-5.9.4-14.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.4-14.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le"
},
"product_reference": "libsnmp40-5.9.4-14.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.4-14.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.s390x"
},
"product_reference": "libsnmp40-5.9.4-14.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.4-14.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64"
},
"product_reference": "libsnmp40-5.9.4-14.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-32bit-5.9.4-14.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x"
},
"product_reference": "libsnmp40-32bit-5.9.4-14.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-32bit-5.9.4-14.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64"
},
"product_reference": "libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.4-14.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.aarch64"
},
"product_reference": "net-snmp-5.9.4-14.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.4-14.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le"
},
"product_reference": "net-snmp-5.9.4-14.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.4-14.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.s390x"
},
"product_reference": "net-snmp-5.9.4-14.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.4-14.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.x86_64"
},
"product_reference": "net-snmp-5.9.4-14.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.4-14.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64"
},
"product_reference": "perl-SNMP-5.9.4-14.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.4-14.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le"
},
"product_reference": "perl-SNMP-5.9.4-14.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.4-14.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x"
},
"product_reference": "perl-SNMP-5.9.4-14.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.4-14.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64"
},
"product_reference": "perl-SNMP-5.9.4-14.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.4-14.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64"
},
"product_reference": "snmp-mibs-5.9.4-14.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.4-14.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le"
},
"product_reference": "snmp-mibs-5.9.4-14.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.4-14.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x"
},
"product_reference": "snmp-mibs-5.9.4-14.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.4-14.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64"
},
"product_reference": "snmp-mibs-5.9.4-14.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-24805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-24805"
}
],
"notes": [
{
"category": "general",
"text": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the `INDEX` of `NET-SNMP-VACM-MIB` can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-24805",
"url": "https://www.suse.com/security/cve/CVE-2022-24805"
},
{
"category": "external",
"summary": "SUSE Bug 1201103 for CVE-2022-24805",
"url": "https://bugzilla.suse.com/1201103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-04T10:21:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-24805"
},
{
"cve": "CVE-2022-24806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-24806"
}
],
"notes": [
{
"category": "general",
"text": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can exploit an Improper Input Validation vulnerability when SETing malformed OIDs in master agent and subagent simultaneously. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-24806",
"url": "https://www.suse.com/security/cve/CVE-2022-24806"
},
{
"category": "external",
"summary": "SUSE Bug 1201103 for CVE-2022-24806",
"url": "https://bugzilla.suse.com/1201103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-04T10:21:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-24806"
},
{
"cve": "CVE-2022-24807",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-24807"
}
],
"notes": [
{
"category": "general",
"text": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a malformed OID in a SET request to `SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable` can cause an out-of-bounds memory access. A user with read-write credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-24807",
"url": "https://www.suse.com/security/cve/CVE-2022-24807"
},
{
"category": "external",
"summary": "SUSE Bug 1201103 for CVE-2022-24807",
"url": "https://bugzilla.suse.com/1201103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-04T10:21:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-24807"
},
{
"cve": "CVE-2022-24808",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-24808"
}
],
"notes": [
{
"category": "general",
"text": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can use a malformed OID in a `SET` request to `NET-SNMP-AGENT-MIB::nsLogTable` to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-24808",
"url": "https://www.suse.com/security/cve/CVE-2022-24808"
},
{
"category": "external",
"summary": "SUSE Bug 1201103 for CVE-2022-24808",
"url": "https://bugzilla.suse.com/1201103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-04T10:21:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-24808"
},
{
"cve": "CVE-2022-24809",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-24809"
}
],
"notes": [
{
"category": "general",
"text": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-only credentials can use a malformed OID in a `GET-NEXT` to the `nsVacmAccessTable` to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-24809",
"url": "https://www.suse.com/security/cve/CVE-2022-24809"
},
{
"category": "external",
"summary": "SUSE Bug 1201103 for CVE-2022-24809",
"url": "https://bugzilla.suse.com/1201103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-04T10:21:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-24809"
},
{
"cve": "CVE-2022-24810",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-24810"
}
],
"notes": [
{
"category": "general",
"text": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can use a malformed OID in a SET to the nsVacmAccessTable to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-24810",
"url": "https://www.suse.com/security/cve/CVE-2022-24810"
},
{
"category": "external",
"summary": "SUSE Bug 1201103 for CVE-2022-24810",
"url": "https://bugzilla.suse.com/1201103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-32bit-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp40-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.9.4-14.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.9.4-14.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-04T10:21:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-24810"
}
]
}
SUSE-SU-2022:4205-2
Vulnerability from csaf_suse - Published: 2022-12-13 11:49 - Updated: 2022-12-13 11:49| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for net-snmp",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for net-snmp fixes the following issues:\n\n Updated to version 5.9.3 (bsc#1201103, jsc#SLE-11203):\n\n - CVE-2022-24805: Fixed a buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB that can cause an out-of-bounds memory access.\n - CVE-2022-24809: Fixed a malformed OID in a GET-NEXT to the nsVacmAccessTable that can cause a NULL pointer dereference.\n - CVE-2022-24806: Fixed an improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously.\n - CVE-2022-24807: Fixed a malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access.\n - CVE-2022-24808: Fixed a malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference.\n - CVE-2022-24810: Fixed a malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4205,SUSE-SLE-Micro-5.3-2022-4205,openSUSE-Leap-Micro-5.3-2022-4205",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4205-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4205-2",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224205-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4205-2",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013226.html"
},
{
"category": "self",
"summary": "SUSE Bug 1201103",
"url": "https://bugzilla.suse.com/1201103"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-24805 page",
"url": "https://www.suse.com/security/cve/CVE-2022-24805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-24806 page",
"url": "https://www.suse.com/security/cve/CVE-2022-24806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-24807 page",
"url": "https://www.suse.com/security/cve/CVE-2022-24807/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-24808 page",
"url": "https://www.suse.com/security/cve/CVE-2022-24808/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-24809 page",
"url": "https://www.suse.com/security/cve/CVE-2022-24809/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-24810 page",
"url": "https://www.suse.com/security/cve/CVE-2022-24810/"
}
],
"title": "Security update for net-snmp",
"tracking": {
"current_release_date": "2022-12-13T11:49:18Z",
"generator": {
"date": "2022-12-13T11:49:18Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4205-2",
"initial_release_date": "2022-12-13T11:49:18Z",
"revision_history": [
{
"date": "2022-12-13T11:49:18Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libsnmp40-5.9.3-150300.15.3.1.aarch64",
"product": {
"name": "libsnmp40-5.9.3-150300.15.3.1.aarch64",
"product_id": "libsnmp40-5.9.3-150300.15.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "net-snmp-5.9.3-150300.15.3.1.aarch64",
"product": {
"name": "net-snmp-5.9.3-150300.15.3.1.aarch64",
"product_id": "net-snmp-5.9.3-150300.15.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"product": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.aarch64",
"product_id": "net-snmp-devel-5.9.3-150300.15.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"product": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.aarch64",
"product_id": "perl-SNMP-5.9.3-150300.15.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "python2-net-snmp-5.9.3-150300.15.3.1.aarch64",
"product": {
"name": "python2-net-snmp-5.9.3-150300.15.3.1.aarch64",
"product_id": "python2-net-snmp-5.9.3-150300.15.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"product": {
"name": "python3-net-snmp-5.9.3-150300.15.3.1.aarch64",
"product_id": "python3-net-snmp-5.9.3-150300.15.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"product": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"product_id": "snmp-mibs-5.9.3-150300.15.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libsnmp40-64bit-5.9.3-150300.15.3.1.aarch64_ilp32",
"product": {
"name": "libsnmp40-64bit-5.9.3-150300.15.3.1.aarch64_ilp32",
"product_id": "libsnmp40-64bit-5.9.3-150300.15.3.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-64bit-5.9.3-150300.15.3.1.aarch64_ilp32",
"product": {
"name": "net-snmp-devel-64bit-5.9.3-150300.15.3.1.aarch64_ilp32",
"product_id": "net-snmp-devel-64bit-5.9.3-150300.15.3.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libsnmp40-5.9.3-150300.15.3.1.i586",
"product": {
"name": "libsnmp40-5.9.3-150300.15.3.1.i586",
"product_id": "libsnmp40-5.9.3-150300.15.3.1.i586"
}
},
{
"category": "product_version",
"name": "net-snmp-5.9.3-150300.15.3.1.i586",
"product": {
"name": "net-snmp-5.9.3-150300.15.3.1.i586",
"product_id": "net-snmp-5.9.3-150300.15.3.1.i586"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.9.3-150300.15.3.1.i586",
"product": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.i586",
"product_id": "net-snmp-devel-5.9.3-150300.15.3.1.i586"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.9.3-150300.15.3.1.i586",
"product": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.i586",
"product_id": "perl-SNMP-5.9.3-150300.15.3.1.i586"
}
},
{
"category": "product_version",
"name": "python2-net-snmp-5.9.3-150300.15.3.1.i586",
"product": {
"name": "python2-net-snmp-5.9.3-150300.15.3.1.i586",
"product_id": "python2-net-snmp-5.9.3-150300.15.3.1.i586"
}
},
{
"category": "product_version",
"name": "python3-net-snmp-5.9.3-150300.15.3.1.i586",
"product": {
"name": "python3-net-snmp-5.9.3-150300.15.3.1.i586",
"product_id": "python3-net-snmp-5.9.3-150300.15.3.1.i586"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.9.3-150300.15.3.1.i586",
"product": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.i586",
"product_id": "snmp-mibs-5.9.3-150300.15.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"product": {
"name": "libsnmp40-5.9.3-150300.15.3.1.ppc64le",
"product_id": "libsnmp40-5.9.3-150300.15.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "net-snmp-5.9.3-150300.15.3.1.ppc64le",
"product": {
"name": "net-snmp-5.9.3-150300.15.3.1.ppc64le",
"product_id": "net-snmp-5.9.3-150300.15.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"product": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.ppc64le",
"product_id": "net-snmp-devel-5.9.3-150300.15.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"product": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.ppc64le",
"product_id": "perl-SNMP-5.9.3-150300.15.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python2-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"product": {
"name": "python2-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"product_id": "python2-net-snmp-5.9.3-150300.15.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"product": {
"name": "python3-net-snmp-5.9.3-150300.15.3.1.ppc64le",
"product_id": "python3-net-snmp-5.9.3-150300.15.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"product": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.ppc64le",
"product_id": "snmp-mibs-5.9.3-150300.15.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libsnmp40-5.9.3-150300.15.3.1.s390x",
"product": {
"name": "libsnmp40-5.9.3-150300.15.3.1.s390x",
"product_id": "libsnmp40-5.9.3-150300.15.3.1.s390x"
}
},
{
"category": "product_version",
"name": "net-snmp-5.9.3-150300.15.3.1.s390x",
"product": {
"name": "net-snmp-5.9.3-150300.15.3.1.s390x",
"product_id": "net-snmp-5.9.3-150300.15.3.1.s390x"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"product": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.s390x",
"product_id": "net-snmp-devel-5.9.3-150300.15.3.1.s390x"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.9.3-150300.15.3.1.s390x",
"product": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.s390x",
"product_id": "perl-SNMP-5.9.3-150300.15.3.1.s390x"
}
},
{
"category": "product_version",
"name": "python2-net-snmp-5.9.3-150300.15.3.1.s390x",
"product": {
"name": "python2-net-snmp-5.9.3-150300.15.3.1.s390x",
"product_id": "python2-net-snmp-5.9.3-150300.15.3.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"product": {
"name": "python3-net-snmp-5.9.3-150300.15.3.1.s390x",
"product_id": "python3-net-snmp-5.9.3-150300.15.3.1.s390x"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.9.3-150300.15.3.1.s390x",
"product": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.s390x",
"product_id": "snmp-mibs-5.9.3-150300.15.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libsnmp40-5.9.3-150300.15.3.1.x86_64",
"product": {
"name": "libsnmp40-5.9.3-150300.15.3.1.x86_64",
"product_id": "libsnmp40-5.9.3-150300.15.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"product": {
"name": "libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64",
"product_id": "libsnmp40-32bit-5.9.3-150300.15.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "net-snmp-5.9.3-150300.15.3.1.x86_64",
"product": {
"name": "net-snmp-5.9.3-150300.15.3.1.x86_64",
"product_id": "net-snmp-5.9.3-150300.15.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"product": {
"name": "net-snmp-devel-5.9.3-150300.15.3.1.x86_64",
"product_id": "net-snmp-devel-5.9.3-150300.15.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"product": {
"name": "net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64",
"product_id": "net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"product": {
"name": "perl-SNMP-5.9.3-150300.15.3.1.x86_64",
"product_id": "perl-SNMP-5.9.3-150300.15.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "python2-net-snmp-5.9.3-150300.15.3.1.x86_64",
"product": {
"name": "python2-net-snmp-5.9.3-150300.15.3.1.x86_64",
"product_id": "python2-net-snmp-5.9.3-150300.15.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"product": {
"name": "python3-net-snmp-5.9.3-150300.15.3.1.x86_64",
"product_id": "python3-net-snmp-5.9.3-150300.15.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"product": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"product_id": "snmp-mibs-5.9.3-150300.15.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap Micro 5.3",
"product": {
"name": "openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap-micro:5.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.3-150300.15.3.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "libsnmp40-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.3-150300.15.3.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "libsnmp40-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.3-150300.15.3.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "libsnmp40-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.s390x"
},
"product_reference": "snmp-mibs-5.9.3-150300.15.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.3-150300.15.3.1.aarch64 as component of openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "libsnmp40-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.3-150300.15.3.1.x86_64 as component of openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "libsnmp40-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.aarch64 as component of openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64"
},
"product_reference": "snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.3-150300.15.3.1.x86_64 as component of openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
},
"product_reference": "snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-24805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-24805"
}
],
"notes": [
{
"category": "general",
"text": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the `INDEX` of `NET-SNMP-VACM-MIB` can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-24805",
"url": "https://www.suse.com/security/cve/CVE-2022-24805"
},
{
"category": "external",
"summary": "SUSE Bug 1201103 for CVE-2022-24805",
"url": "https://bugzilla.suse.com/1201103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-13T11:49:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-24805"
},
{
"cve": "CVE-2022-24806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-24806"
}
],
"notes": [
{
"category": "general",
"text": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can exploit an Improper Input Validation vulnerability when SETing malformed OIDs in master agent and subagent simultaneously. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-24806",
"url": "https://www.suse.com/security/cve/CVE-2022-24806"
},
{
"category": "external",
"summary": "SUSE Bug 1201103 for CVE-2022-24806",
"url": "https://bugzilla.suse.com/1201103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-13T11:49:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-24806"
},
{
"cve": "CVE-2022-24807",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-24807"
}
],
"notes": [
{
"category": "general",
"text": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a malformed OID in a SET request to `SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable` can cause an out-of-bounds memory access. A user with read-write credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-24807",
"url": "https://www.suse.com/security/cve/CVE-2022-24807"
},
{
"category": "external",
"summary": "SUSE Bug 1201103 for CVE-2022-24807",
"url": "https://bugzilla.suse.com/1201103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-13T11:49:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-24807"
},
{
"cve": "CVE-2022-24808",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-24808"
}
],
"notes": [
{
"category": "general",
"text": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can use a malformed OID in a `SET` request to `NET-SNMP-AGENT-MIB::nsLogTable` to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-24808",
"url": "https://www.suse.com/security/cve/CVE-2022-24808"
},
{
"category": "external",
"summary": "SUSE Bug 1201103 for CVE-2022-24808",
"url": "https://bugzilla.suse.com/1201103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-13T11:49:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-24808"
},
{
"cve": "CVE-2022-24809",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-24809"
}
],
"notes": [
{
"category": "general",
"text": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-only credentials can use a malformed OID in a `GET-NEXT` to the `nsVacmAccessTable` to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-24809",
"url": "https://www.suse.com/security/cve/CVE-2022-24809"
},
{
"category": "external",
"summary": "SUSE Bug 1201103 for CVE-2022-24809",
"url": "https://bugzilla.suse.com/1201103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-13T11:49:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-24809"
},
{
"cve": "CVE-2022-24810",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-24810"
}
],
"notes": [
{
"category": "general",
"text": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can use a malformed OID in a SET to the nsVacmAccessTable to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-24810",
"url": "https://www.suse.com/security/cve/CVE-2022-24810"
},
{
"category": "external",
"summary": "SUSE Bug 1201103 for CVE-2022-24810",
"url": "https://bugzilla.suse.com/1201103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.3.1.x86_64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.aarch64",
"openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-13T11:49:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-24810"
}
]
}
WID-SEC-W-2026-1022
Vulnerability from csaf_certbund - Published: 2026-04-08 22:00 - Updated: 2026-04-09 22:00| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Juniper Apstra (ehemals bekannt als AOS) automatisiert alle Aspekte der Rechnzentrums-Netzwerkplanung, des Aufbaus, der Bereitstellung und des Betriebs.\r\nJUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.\r\nDie Switches der QFX-Serie von Juniper sichern und automatisieren Netzwerke in Rechenzentren. \r\nDie Juniper MX-Serie ist eine Produktfamilie von Routern.\r\nSRX Series Services Gateways ist ein Next-Generation Anti-Threat Firewall von Juniper.\r\nJunos Space ist eine Software-Plattform, die eine Reihe von Applikationen f\u00fcr das Netzwerkmanagement beinhaltet.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Juniper Apstra, Junos OS, Junos OS Evolved und Junos Space ausnutzen, um erweiterte Berechtigungen \u2013 sogar Root-Rechte \u2013 zu erlangen, beliebigen Code auszuf\u00fchren \u2013 auch mit erweiterten Berechtigungen \u2013, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuf\u00fchren oder Daten zu manipulieren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-1022 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1022.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-1022 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1022"
},
{
"category": "external",
"summary": "Juniper Patchday April 2026 vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/global-search/%40uri#sortCriteria=date%20descending\u0026f-sf_primarysourcename=Knowledge\u0026f-sf_articletype=Security%20Advisories\u0026numberOfResults=100"
},
{
"category": "external",
"summary": "Juniper Security Bulletin - Apstra: SSH host key validation vulnerability for managed devices (CVE-2025-13914) vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Apstra-SSH-host-key-validation-vulnerability-for-managed-devices-CVE-2025-13914"
},
{
"category": "external",
"summary": "Juniper Security Bulletin - CTP OS: Configuring password requirements does not work which permits the use of weak passwords (CVE-2026-33771) vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-CTP-OS-Configuring-password-requirements-does-not-work-which-permits-the-use-of-weak-passwords-CVE-2026-33771"
},
{
"category": "external",
"summary": "Juniper Security Bulletin - JSI Virtual Lightweight Collector: Shell escape allows privilege escalation to root (CVE-2026-21915) vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-JSI-Virtual-Lightweight-Collector-Shell-escape-allows-privilege-escalation-to-root-CVE-2026-21915"
},
{
"category": "external",
"summary": "Juniper Security Bulletin - Junos OS and Junos OS Evolved: A high frequency of connecting and disconnecting netconf sessions causes management unavailability (CVE-2026-21919) vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-high-frequency-of-connecting-and-disconnecting-netconf-sessions-causes-management-unavailability-CVE-2026-21919"
},
{
"category": "external",
"summary": "Juniper Security Bulletin - Junos OS and Junos OS Evolved: An attacker sending a specific genuine BGP packet causes a BGP reset (CVE-2026-33797) vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-attacker-sending-a-specific-genuine-BGP-packet-causes-a-BGP-reset-CVE-2026-33797"
},
{
"category": "external",
"summary": "Juniper Security Bulletin - Junos OS and Junos OS Evolved: CVE-2022-24805 resolved in net-SNMP vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-CVE-2022-24805-resolved-in-net-SNMP"
},
{
"category": "external",
"summary": "Juniper Security Bulletin - Junos OS and Junos OS Evolved: Execution of crafted CLI commands allows for arbitrary shell injection as root (CVE-2026-33791) vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Execution-of-crafted-CLI-commands-allows-for-arbitrary-shell-injection-as-root-CVE-2026-33791"
},
{
"category": "external",
"summary": "Juniper Security Bulletin - Junos OS and Junos OS Evolved: In an EVPN-MPLS scenario churn of ESI routes causes a memory leak in l2ald (CVE-2026-33780) vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-an-EVPN-MPLS-scenario-churn-of-ESI-routes-causes-a-memory-leak-in-l2ald-CVE-2026-33780"
},
{
"category": "external",
"summary": "Juniper Security Bulletin - Junos OS and Junos OS Evolved: Specific low privileged CLI command exposes sensitive information (CVE-2026-33776) vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Specific-low-privileged-CLI-command-exposes-sensitive-information-CVE-2026-33776"
},
{
"category": "external",
"summary": "Juniper Security Bulletin - Junos OS and Junos OS Evolved: When an unsigned Python op script configuration is present, a local low privileged user can compromise the system (CVE-2026-33793) vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-an-unsigned-Python-op-script-configuration-is-present-a-local-low-privileged-user-can-compromise-the-system-CVE-2026-33793"
},
{
"category": "external",
"summary": "Juniper Security Bulletin - Junos OS Evolved: Local, authenticated attackers can gain access to FPCs (CVE-2026-33788) vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-Evolved-Local-authenticated-attackers-can-gain-access-to-FPCs-CVE-2026-33788"
},
{
"category": "external",
"summary": "Juniper Security Bulletin - Junos OS Evolved: PTX Series: If SRTE tunnels provisioned via PCEP are present and specific gRPC queries are received evo-aftman crashes (CVE-2026-33783) vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-Evolved-PTX-Series-If-SRTE-tunnels-provisioned-via-PCEP-are-present-and-specific-gRPC-queries-are-received-evo-aftman-crashes-CVE-2026-33783"
},
{
"category": "external",
"summary": "Juniper Security Bulletin - Junos OS Evolved: QFX5000 Series and PTX Series: An attacker sending crafted multicast packets will cause evo-aftmand / evo-pfemand to crash and restart (CVE-2025-59969) vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-Evolved-QFX5000-Series-and-PTX-Series-An-attacker-sending-crafted-multicast-packets-will-cause-evo-aftmand-evo-pfemand-to-crash-and-restart-CVE-2025-59969"
},
{
"category": "external",
"summary": "Juniper Security Bulletin - Junos OS: A low privileged user can escalate their privileges so that they can login as root (CVE-2026-21916) vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-A-low-privileged-user-can-escalate-their-privileges-so-that-they-can-login-as-root-CVE-2026-21916"
},
{
"category": "external",
"summary": "Juniper Security Bulletin - Junos OS: EX Series, QFX Series: If the same egress filter is configured on both an IRB and a physical interface one of those is not applied (CVE-2026-33773) vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-EX-Series-QFX-Series-If-the-same-egress-filter-is-configured-on-both-an-IRB-and-a-physical-interface-one-of-those-is-not-applied-CVE-2026-33773"
},
{
"category": "external",
"summary": "Juniper Security Bulletin - Junos OS: EX Series, QFX Series: In a VXLAN scenario when specific control protocol packets are received, memory leaks and eventually no traffic is passed (CVE-2026-33781) vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-EX-Series-QFX-Series-In-a-VXLAN-scenario-when-specific-control-protocol-packets-are-received-memory-leaks-and-eventually-no-traffic-is-passed-CVE-2026-33781"
},
{
"category": "external",
"summary": "Juniper Security Bulletin - Junos OS: MX Series: Firewall filters on lo0. in the default routing instance are not in effect (CVE-2026-33774) vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-MX-Series-Firewall-filters-on-lo0-non-0-in-the-default-routing-instance-are-not-in-effect-CVE-2026-33774"
},
{
"category": "external",
"summary": "Juniper Security Bulletin - Junos OS: MX Series: In specific DHCPv6 scenarios jdhcpd memory increases continuously with subscriber logouts (CVE-2026-33782) vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-MX-Series-In-specific-DHCPv6-scenarios-jdhcpd-memory-increases-continuously-with-subscriber-logouts-CVE-2026-33782"
},
{
"category": "external",
"summary": "Juniper Security Bulletin - Junos OS: MX Series: Mismatch between configured and received packet types causes memory leak in bbe-smgd (CVE-2026-33775) vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-MX-Series-Mismatch-between-configured-and-received-packet-types-causes-memory-leak-in-bbe-smgd-CVE-2026-33775"
},
{
"category": "external",
"summary": "Juniper Security Bulletin - Junos OS: MX Series: Missing Authorization for specific \u0027request\u0027 CLI commands in a JDM/CSDS scenario (CVE-2026-33785) vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-MX-Series-Missing-Authorization-for-specific-request-CLI-commands-in-a-JDM-CSDS-scenario-CVE-2026-33785"
},
{
"category": "external",
"summary": "Juniper Security Bulletin - Junos OS: Privileged local user can gain access to a Linux-based FPC as root (CVE-2025-30650) vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-Privileged-local-user-can-gain-access-to-a-Linux-based-FPC-as-root-CVE-2025-30650"
},
{
"category": "external",
"summary": "Juniper Security Bulletin - Junos OS: SRX Series, MX Series: When a specifically malformed first ISAKMP packet is received kmd/iked crashes (CVE-2026-33778) vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-SRX-Series-MX-Series-When-a-specifically-malformed-first-ISAKMP-packet-is-received-kmd-iked-crashes-CVE-2026-33778"
},
{
"category": "external",
"summary": "Juniper Security Bulletin - Junos OS: SRX Series: In a NAT64 configuration, receipt of a specific, malformed ICMPv6 packet will cause the srxpfe process to crash and restart. (CVE-2026-33790) vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-SRX-Series-In-a-NAT64-configuration-receipt-of-a-specific-malformed-ICMPv6-packet-will-cause-the-srxpfe-process-to-crash-and-restart-CVE-2026-33790"
},
{
"category": "external",
"summary": "Juniper Security Bulletin - Junos OS: SRX Series: Insufficient certificate verification for device to SD cloud communication (CVE-2026-33779) vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-SRX-Series-Insufficient-certificate-verification-for-device-to-SD-cloud-communication-CVE-2026-33779"
},
{
"category": "external",
"summary": "Juniper Security Bulletin - Junos OS: SRX1500, SRX4100, SRX4200, SRX4600: When a specific show command is executed chassisd crashes (CVE-2026-33787) vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-SRX1500-SRX4100-SRX4200-SRX4600-When-a-specific-show-command-is-executed-chassisd-crashes-CVE-2026-33787"
},
{
"category": "external",
"summary": "Juniper Security Bulletin - Junos OS: SRX1600, SRX2300, SRX4300: When a specific show command is executed chassisd crashes (CVE-2026-33786) vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-SRX1600-SRX2300-SRX4300-When-a-specific-show-command-is-executed-chassisd-crashes-CVE-2026-33786"
},
{
"category": "external",
"summary": "Juniper Security Bulletin - Junos Space: ilpFilter field on nLegacy.jsp is vulnerable to reflected cross-site script injection (CVE-2026-21904) vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-Space-ilpFilter-field-on-nLegacy-jsp-is-vulnerable-to-reflected-cross-site-script-injection-CVE-2026-21904"
},
{
"category": "external",
"summary": "Juniper Security Bulletin - vLWC: Default password is not required to be changed which allows unauthorized high-privileged access (CVE-2026-33784) vom 2026-04-08",
"url": "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-vLWC-Default-password-is-not-required-to-be-changed-which-allows-unauthorized-high-privileged-access-CVE-2026-33784"
}
],
"source_lang": "en-US",
"title": "Juniper Patchday April 2026: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-04-09T22:00:00.000+00:00",
"generator": {
"date": "2026-04-10T07:05:13.126+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-1022",
"initial_release_date": "2026-04-08T22:00:00.000+00:00",
"revision_history": [
{
"date": "2026-04-08T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-04-09T22:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2026-21088, EUVD-2026-21086, EUVD-2026-21091, EUVD-2026-21090, EUVD-2026-21085, EUVD-2026-21092, EUVD-2026-21080, EUVD-2026-21082, EUVD-2026-21078, EUVD-2026-21077, EUVD-2025-209396, EUVD-2026-21095, EUVD-2026-21206, EUVD-2026-21205, EUVD-2026-21204, EUVD-2026-21203, EUVD-2026-21201, EUVD-2026-21199, EUVD-2026-21197, EUVD-2026-21196, EUVD-2026-21195, EUVD-2025-209397, EUVD-2026-21093, EUVD-2026-21207, EUVD-2026-21193, EUVD-2026-21208"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.1.1",
"product": {
"name": "Juniper Apstra \u003c6.1.1",
"product_id": "T052563"
}
},
{
"category": "product_version",
"name": "6.1.1",
"product": {
"name": "Juniper Apstra 6.1.1",
"product_id": "T052563-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:apstra:6.1.1"
}
}
}
],
"category": "product_name",
"name": "Apstra"
},
{
"branches": [
{
"category": "product_version",
"name": "OS",
"product": {
"name": "Juniper JUNOS OS",
"product_id": "T052565",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:os"
}
}
},
{
"category": "product_version",
"name": "OS Evolved",
"product": {
"name": "Juniper JUNOS OS Evolved",
"product_id": "T052566",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:os_evolved"
}
}
}
],
"category": "product_name",
"name": "JUNOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c24.1R5 Patch V3",
"product": {
"name": "Juniper Junos Space \u003c24.1R5 Patch V3",
"product_id": "T052571"
}
},
{
"category": "product_version",
"name": "24.1R5 Patch V3",
"product": {
"name": "Juniper Junos Space 24.1R5 Patch V3",
"product_id": "T052571-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:24.1r5_patch_v3"
}
}
}
],
"category": "product_name",
"name": "Junos Space"
},
{
"category": "product_name",
"name": "Juniper MX Series",
"product": {
"name": "Juniper MX Series",
"product_id": "T052568",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:mx:-"
}
}
},
{
"category": "product_name",
"name": "Juniper QFX Series",
"product": {
"name": "Juniper QFX Series",
"product_id": "T052567",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:qfx:os_evolved"
}
}
},
{
"category": "product_name",
"name": "Juniper SRX Series",
"product": {
"name": "Juniper SRX Series",
"product_id": "T052569",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:srx_service_gateways:-"
}
}
}
],
"category": "vendor",
"name": "Juniper"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-24805",
"product_status": {
"known_affected": [
"T052568",
"T052569",
"T052566",
"T052567",
"T052565"
]
},
"release_date": "2026-04-08T22:00:00.000+00:00",
"title": "CVE-2022-24805"
},
{
"cve": "CVE-2025-30650",
"product_status": {
"known_affected": [
"T052568",
"T052569",
"T052566",
"T052567",
"T052565"
]
},
"release_date": "2026-04-08T22:00:00.000+00:00",
"title": "CVE-2025-30650"
},
{
"cve": "CVE-2025-59969",
"product_status": {
"known_affected": [
"T052568",
"T052569",
"T052566",
"T052567",
"T052565"
]
},
"release_date": "2026-04-08T22:00:00.000+00:00",
"title": "CVE-2025-59969"
},
{
"cve": "CVE-2026-21915",
"product_status": {
"known_affected": [
"T052568",
"T052569",
"T052566",
"T052567",
"T052565"
]
},
"release_date": "2026-04-08T22:00:00.000+00:00",
"title": "CVE-2026-21915"
},
{
"cve": "CVE-2026-21916",
"product_status": {
"known_affected": [
"T052568",
"T052569",
"T052566",
"T052567",
"T052565"
]
},
"release_date": "2026-04-08T22:00:00.000+00:00",
"title": "CVE-2026-21916"
},
{
"cve": "CVE-2026-21919",
"product_status": {
"known_affected": [
"T052568",
"T052569",
"T052566",
"T052567",
"T052565"
]
},
"release_date": "2026-04-08T22:00:00.000+00:00",
"title": "CVE-2026-21919"
},
{
"cve": "CVE-2026-33771",
"product_status": {
"known_affected": [
"T052568",
"T052569",
"T052566",
"T052567",
"T052565"
]
},
"release_date": "2026-04-08T22:00:00.000+00:00",
"title": "CVE-2026-33771"
},
{
"cve": "CVE-2026-33773",
"product_status": {
"known_affected": [
"T052568",
"T052569",
"T052566",
"T052567",
"T052565"
]
},
"release_date": "2026-04-08T22:00:00.000+00:00",
"title": "CVE-2026-33773"
},
{
"cve": "CVE-2026-33774",
"product_status": {
"known_affected": [
"T052568",
"T052569",
"T052566",
"T052567",
"T052565"
]
},
"release_date": "2026-04-08T22:00:00.000+00:00",
"title": "CVE-2026-33774"
},
{
"cve": "CVE-2026-33775",
"product_status": {
"known_affected": [
"T052568",
"T052569",
"T052566",
"T052567",
"T052565"
]
},
"release_date": "2026-04-08T22:00:00.000+00:00",
"title": "CVE-2026-33775"
},
{
"cve": "CVE-2026-33776",
"product_status": {
"known_affected": [
"T052568",
"T052569",
"T052566",
"T052567",
"T052565"
]
},
"release_date": "2026-04-08T22:00:00.000+00:00",
"title": "CVE-2026-33776"
},
{
"cve": "CVE-2026-33778",
"product_status": {
"known_affected": [
"T052568",
"T052569",
"T052566",
"T052567",
"T052565"
]
},
"release_date": "2026-04-08T22:00:00.000+00:00",
"title": "CVE-2026-33778"
},
{
"cve": "CVE-2026-33779",
"product_status": {
"known_affected": [
"T052568",
"T052569",
"T052566",
"T052567",
"T052565"
]
},
"release_date": "2026-04-08T22:00:00.000+00:00",
"title": "CVE-2026-33779"
},
{
"cve": "CVE-2026-33780",
"product_status": {
"known_affected": [
"T052568",
"T052569",
"T052566",
"T052567",
"T052565"
]
},
"release_date": "2026-04-08T22:00:00.000+00:00",
"title": "CVE-2026-33780"
},
{
"cve": "CVE-2026-33781",
"product_status": {
"known_affected": [
"T052568",
"T052569",
"T052566",
"T052567",
"T052565"
]
},
"release_date": "2026-04-08T22:00:00.000+00:00",
"title": "CVE-2026-33781"
},
{
"cve": "CVE-2026-33782",
"product_status": {
"known_affected": [
"T052568",
"T052569",
"T052566",
"T052567",
"T052565"
]
},
"release_date": "2026-04-08T22:00:00.000+00:00",
"title": "CVE-2026-33782"
},
{
"cve": "CVE-2026-33783",
"product_status": {
"known_affected": [
"T052568",
"T052569",
"T052566",
"T052567",
"T052565"
]
},
"release_date": "2026-04-08T22:00:00.000+00:00",
"title": "CVE-2026-33783"
},
{
"cve": "CVE-2026-33784",
"product_status": {
"known_affected": [
"T052568",
"T052569",
"T052566",
"T052567",
"T052565"
]
},
"release_date": "2026-04-08T22:00:00.000+00:00",
"title": "CVE-2026-33784"
},
{
"cve": "CVE-2026-33785",
"product_status": {
"known_affected": [
"T052568",
"T052569",
"T052566",
"T052567",
"T052565"
]
},
"release_date": "2026-04-08T22:00:00.000+00:00",
"title": "CVE-2026-33785"
},
{
"cve": "CVE-2026-33786",
"product_status": {
"known_affected": [
"T052568",
"T052569",
"T052566",
"T052567",
"T052565"
]
},
"release_date": "2026-04-08T22:00:00.000+00:00",
"title": "CVE-2026-33786"
},
{
"cve": "CVE-2026-33787",
"product_status": {
"known_affected": [
"T052568",
"T052569",
"T052566",
"T052567",
"T052565"
]
},
"release_date": "2026-04-08T22:00:00.000+00:00",
"title": "CVE-2026-33787"
},
{
"cve": "CVE-2026-33788",
"product_status": {
"known_affected": [
"T052568",
"T052569",
"T052566",
"T052567",
"T052565"
]
},
"release_date": "2026-04-08T22:00:00.000+00:00",
"title": "CVE-2026-33788"
},
{
"cve": "CVE-2026-33790",
"product_status": {
"known_affected": [
"T052568",
"T052569",
"T052566",
"T052567",
"T052565"
]
},
"release_date": "2026-04-08T22:00:00.000+00:00",
"title": "CVE-2026-33790"
},
{
"cve": "CVE-2026-33791",
"product_status": {
"known_affected": [
"T052568",
"T052569",
"T052566",
"T052567",
"T052565"
]
},
"release_date": "2026-04-08T22:00:00.000+00:00",
"title": "CVE-2026-33791"
},
{
"cve": "CVE-2026-33793",
"product_status": {
"known_affected": [
"T052568",
"T052569",
"T052566",
"T052567",
"T052565"
]
},
"release_date": "2026-04-08T22:00:00.000+00:00",
"title": "CVE-2026-33793"
},
{
"cve": "CVE-2026-33797",
"product_status": {
"known_affected": [
"T052568",
"T052569",
"T052566",
"T052567",
"T052565"
]
},
"release_date": "2026-04-08T22:00:00.000+00:00",
"title": "CVE-2026-33797"
},
{
"cve": "CVE-2026-21904",
"product_status": {
"known_affected": [
"T052571"
]
},
"release_date": "2026-04-08T22:00:00.000+00:00",
"title": "CVE-2026-21904"
},
{
"cve": "CVE-2025-13914",
"product_status": {
"known_affected": [
"T052563"
]
},
"release_date": "2026-04-08T22:00:00.000+00:00",
"title": "CVE-2025-13914"
}
]
}
alsa-2024:7260
Vulnerability from osv_almalinux
The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.
Security Fix(es):
- net-snmp: A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access. (CVE-2022-24805)
- : net-snmp: Improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously (CVE-2022-24806)
- net-snmp: A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access (CVE-2022-24807)
- net-snmp: A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference. (CVE-2022-24809)
- net-snmp: A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference (CVE-2022-24808)
- net-snmp: A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference. (CVE-2022-24810)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "net-snmp"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:5.9.1-13.el9_4.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "net-snmp-agent-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:5.9.1-13.el9_4.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "net-snmp-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:5.9.1-13.el9_4.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "net-snmp-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:5.9.1-13.el9_4.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "net-snmp-perl"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:5.9.1-13.el9_4.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "net-snmp-utils"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:5.9.1-13.el9_4.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "python3-net-snmp"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:5.9.1-13.el9_4.3"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.\n\nSecurity Fix(es):\n\n* net-snmp: A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access. (CVE-2022-24805)\n* : net-snmp: Improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously (CVE-2022-24806)\n* net-snmp: A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access (CVE-2022-24807)\n* net-snmp: A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference. (CVE-2022-24809)\n* net-snmp: A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference (CVE-2022-24808)\n* net-snmp: A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference. (CVE-2022-24810)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"id": "ALSA-2024:7260",
"modified": "2024-09-27T07:22:47Z",
"published": "2024-09-26T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2024:7260"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-24805"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-24806"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-24807"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-24808"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-24809"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-24810"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2103225"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2104759"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2104763"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2104766"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2104768"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2104769"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2024-7260.html"
}
],
"related": [
"CVE-2022-24805",
"CVE-2022-24806",
"CVE-2022-24807",
"CVE-2022-24809",
"CVE-2022-24808",
"CVE-2022-24810"
],
"summary": "Moderate: net-snmp security update"
}
RHSA-2024:7875
Vulnerability from csaf_redhat - Published: 2024-10-09 18:30 - Updated: 2026-03-18 02:47A flaw was found in net-snmp. A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access issue.
A flaw was found in net-snmp. This issue occurs due to improper input validation when simultaneously setting malformed OIDs in the master agent and subagent.
A flaw was found in net-snmp. A malformed OID in a SET request to the SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access issue.
A flaw was found in net-snmp. A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference issue.
A flaw was found in net-snmp. A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference issue.
A flaw was found in net-snmp. A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference issue.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for net-snmp is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.\n\nSecurity Fix(es):\n\n* net-snmp: A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access. (CVE-2022-24805)\n\n* : net-snmp: Improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously (CVE-2022-24806)\n\n* net-snmp: A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access (CVE-2022-24807)\n\n* net-snmp: A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference. (CVE-2022-24809)\n\n* net-snmp: A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference (CVE-2022-24808)\n\n* net-snmp: A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference. (CVE-2022-24810)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:7875",
"url": "https://access.redhat.com/errata/RHSA-2024:7875"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2103225",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103225"
},
{
"category": "external",
"summary": "2104759",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104759"
},
{
"category": "external",
"summary": "2104763",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104763"
},
{
"category": "external",
"summary": "2104766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104766"
},
{
"category": "external",
"summary": "2104768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104768"
},
{
"category": "external",
"summary": "2104769",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104769"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_7875.json"
}
],
"title": "Red Hat Security Advisory: net-snmp security update",
"tracking": {
"current_release_date": "2026-03-18T02:47:01+00:00",
"generator": {
"date": "2026-03-18T02:47:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2024:7875",
"initial_release_date": "2024-10-09T18:30:25+00:00",
"revision_history": [
{
"date": "2024-10-09T18:30:25+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-09T18:30:25+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T02:47:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-1:5.9.1-11.el9_2.2.src",
"product": {
"name": "net-snmp-1:5.9.1-11.el9_2.2.src",
"product_id": "net-snmp-1:5.9.1-11.el9_2.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.9.1-11.el9_2.2?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"product": {
"name": "net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"product_id": "net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.9.1-11.el9_2.2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.9.1-11.el9_2.2.aarch64",
"product": {
"name": "net-snmp-agent-libs-1:5.9.1-11.el9_2.2.aarch64",
"product_id": "net-snmp-agent-libs-1:5.9.1-11.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.9.1-11.el9_2.2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.9.1-11.el9_2.2.aarch64",
"product": {
"name": "net-snmp-devel-1:5.9.1-11.el9_2.2.aarch64",
"product_id": "net-snmp-devel-1:5.9.1-11.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.9.1-11.el9_2.2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.9.1-11.el9_2.2.aarch64",
"product": {
"name": "net-snmp-libs-1:5.9.1-11.el9_2.2.aarch64",
"product_id": "net-snmp-libs-1:5.9.1-11.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.9.1-11.el9_2.2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.9.1-11.el9_2.2.aarch64",
"product": {
"name": "net-snmp-perl-1:5.9.1-11.el9_2.2.aarch64",
"product_id": "net-snmp-perl-1:5.9.1-11.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.9.1-11.el9_2.2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.9.1-11.el9_2.2.aarch64",
"product": {
"name": "net-snmp-utils-1:5.9.1-11.el9_2.2.aarch64",
"product_id": "net-snmp-utils-1:5.9.1-11.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.9.1-11.el9_2.2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"product": {
"name": "python3-net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"product_id": "python3-net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-net-snmp@5.9.1-11.el9_2.2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debugsource-1:5.9.1-11.el9_2.2.aarch64",
"product": {
"name": "net-snmp-debugsource-1:5.9.1-11.el9_2.2.aarch64",
"product_id": "net-snmp-debugsource-1:5.9.1-11.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debugsource@5.9.1-11.el9_2.2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"product": {
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"product_id": "net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.9.1-11.el9_2.2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"product": {
"name": "net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"product_id": "net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.9.1-11.el9_2.2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"product": {
"name": "net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"product_id": "net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.9.1-11.el9_2.2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"product": {
"name": "net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"product_id": "net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.9.1-11.el9_2.2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"product": {
"name": "net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"product_id": "net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.9.1-11.el9_2.2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"product": {
"name": "python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"product_id": "python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-net-snmp-debuginfo@5.9.1-11.el9_2.2?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"product": {
"name": "net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"product_id": "net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.9.1-11.el9_2.2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.9.1-11.el9_2.2.ppc64le",
"product": {
"name": "net-snmp-agent-libs-1:5.9.1-11.el9_2.2.ppc64le",
"product_id": "net-snmp-agent-libs-1:5.9.1-11.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.9.1-11.el9_2.2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.9.1-11.el9_2.2.ppc64le",
"product": {
"name": "net-snmp-devel-1:5.9.1-11.el9_2.2.ppc64le",
"product_id": "net-snmp-devel-1:5.9.1-11.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.9.1-11.el9_2.2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.9.1-11.el9_2.2.ppc64le",
"product": {
"name": "net-snmp-libs-1:5.9.1-11.el9_2.2.ppc64le",
"product_id": "net-snmp-libs-1:5.9.1-11.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.9.1-11.el9_2.2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.9.1-11.el9_2.2.ppc64le",
"product": {
"name": "net-snmp-perl-1:5.9.1-11.el9_2.2.ppc64le",
"product_id": "net-snmp-perl-1:5.9.1-11.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.9.1-11.el9_2.2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.9.1-11.el9_2.2.ppc64le",
"product": {
"name": "net-snmp-utils-1:5.9.1-11.el9_2.2.ppc64le",
"product_id": "net-snmp-utils-1:5.9.1-11.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.9.1-11.el9_2.2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"product": {
"name": "python3-net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"product_id": "python3-net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-net-snmp@5.9.1-11.el9_2.2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debugsource-1:5.9.1-11.el9_2.2.ppc64le",
"product": {
"name": "net-snmp-debugsource-1:5.9.1-11.el9_2.2.ppc64le",
"product_id": "net-snmp-debugsource-1:5.9.1-11.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debugsource@5.9.1-11.el9_2.2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"product": {
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"product_id": "net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.9.1-11.el9_2.2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"product": {
"name": "net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"product_id": "net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.9.1-11.el9_2.2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"product": {
"name": "net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"product_id": "net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.9.1-11.el9_2.2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"product": {
"name": "net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"product_id": "net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.9.1-11.el9_2.2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"product": {
"name": "net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"product_id": "net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.9.1-11.el9_2.2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"product": {
"name": "python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"product_id": "python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-net-snmp-debuginfo@5.9.1-11.el9_2.2?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"product": {
"name": "net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"product_id": "net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.9.1-11.el9_2.2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.9.1-11.el9_2.2.x86_64",
"product": {
"name": "net-snmp-agent-libs-1:5.9.1-11.el9_2.2.x86_64",
"product_id": "net-snmp-agent-libs-1:5.9.1-11.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.9.1-11.el9_2.2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.9.1-11.el9_2.2.x86_64",
"product": {
"name": "net-snmp-devel-1:5.9.1-11.el9_2.2.x86_64",
"product_id": "net-snmp-devel-1:5.9.1-11.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.9.1-11.el9_2.2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.9.1-11.el9_2.2.x86_64",
"product": {
"name": "net-snmp-libs-1:5.9.1-11.el9_2.2.x86_64",
"product_id": "net-snmp-libs-1:5.9.1-11.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.9.1-11.el9_2.2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.9.1-11.el9_2.2.x86_64",
"product": {
"name": "net-snmp-perl-1:5.9.1-11.el9_2.2.x86_64",
"product_id": "net-snmp-perl-1:5.9.1-11.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.9.1-11.el9_2.2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.9.1-11.el9_2.2.x86_64",
"product": {
"name": "net-snmp-utils-1:5.9.1-11.el9_2.2.x86_64",
"product_id": "net-snmp-utils-1:5.9.1-11.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.9.1-11.el9_2.2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"product": {
"name": "python3-net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"product_id": "python3-net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-net-snmp@5.9.1-11.el9_2.2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debugsource-1:5.9.1-11.el9_2.2.x86_64",
"product": {
"name": "net-snmp-debugsource-1:5.9.1-11.el9_2.2.x86_64",
"product_id": "net-snmp-debugsource-1:5.9.1-11.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debugsource@5.9.1-11.el9_2.2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"product": {
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"product_id": "net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.9.1-11.el9_2.2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"product": {
"name": "net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"product_id": "net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.9.1-11.el9_2.2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"product": {
"name": "net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"product_id": "net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.9.1-11.el9_2.2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"product": {
"name": "net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"product_id": "net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.9.1-11.el9_2.2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"product": {
"name": "net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"product_id": "net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.9.1-11.el9_2.2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"product": {
"name": "python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"product_id": "python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-net-snmp-debuginfo@5.9.1-11.el9_2.2?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.9.1-11.el9_2.2.i686",
"product": {
"name": "net-snmp-agent-libs-1:5.9.1-11.el9_2.2.i686",
"product_id": "net-snmp-agent-libs-1:5.9.1-11.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.9.1-11.el9_2.2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.9.1-11.el9_2.2.i686",
"product": {
"name": "net-snmp-devel-1:5.9.1-11.el9_2.2.i686",
"product_id": "net-snmp-devel-1:5.9.1-11.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.9.1-11.el9_2.2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.9.1-11.el9_2.2.i686",
"product": {
"name": "net-snmp-libs-1:5.9.1-11.el9_2.2.i686",
"product_id": "net-snmp-libs-1:5.9.1-11.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.9.1-11.el9_2.2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debugsource-1:5.9.1-11.el9_2.2.i686",
"product": {
"name": "net-snmp-debugsource-1:5.9.1-11.el9_2.2.i686",
"product_id": "net-snmp-debugsource-1:5.9.1-11.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debugsource@5.9.1-11.el9_2.2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"product": {
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"product_id": "net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.9.1-11.el9_2.2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"product": {
"name": "net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"product_id": "net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.9.1-11.el9_2.2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"product": {
"name": "net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"product_id": "net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.9.1-11.el9_2.2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.i686",
"product": {
"name": "net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.i686",
"product_id": "net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.9.1-11.el9_2.2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.i686",
"product": {
"name": "net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.i686",
"product_id": "net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.9.1-11.el9_2.2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"product": {
"name": "python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"product_id": "python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-net-snmp-debuginfo@5.9.1-11.el9_2.2?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-1:5.9.1-11.el9_2.2.s390x",
"product": {
"name": "net-snmp-1:5.9.1-11.el9_2.2.s390x",
"product_id": "net-snmp-1:5.9.1-11.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.9.1-11.el9_2.2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.9.1-11.el9_2.2.s390x",
"product": {
"name": "net-snmp-agent-libs-1:5.9.1-11.el9_2.2.s390x",
"product_id": "net-snmp-agent-libs-1:5.9.1-11.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.9.1-11.el9_2.2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.9.1-11.el9_2.2.s390x",
"product": {
"name": "net-snmp-devel-1:5.9.1-11.el9_2.2.s390x",
"product_id": "net-snmp-devel-1:5.9.1-11.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.9.1-11.el9_2.2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.9.1-11.el9_2.2.s390x",
"product": {
"name": "net-snmp-libs-1:5.9.1-11.el9_2.2.s390x",
"product_id": "net-snmp-libs-1:5.9.1-11.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.9.1-11.el9_2.2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.9.1-11.el9_2.2.s390x",
"product": {
"name": "net-snmp-perl-1:5.9.1-11.el9_2.2.s390x",
"product_id": "net-snmp-perl-1:5.9.1-11.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.9.1-11.el9_2.2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.9.1-11.el9_2.2.s390x",
"product": {
"name": "net-snmp-utils-1:5.9.1-11.el9_2.2.s390x",
"product_id": "net-snmp-utils-1:5.9.1-11.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.9.1-11.el9_2.2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-net-snmp-1:5.9.1-11.el9_2.2.s390x",
"product": {
"name": "python3-net-snmp-1:5.9.1-11.el9_2.2.s390x",
"product_id": "python3-net-snmp-1:5.9.1-11.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-net-snmp@5.9.1-11.el9_2.2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debugsource-1:5.9.1-11.el9_2.2.s390x",
"product": {
"name": "net-snmp-debugsource-1:5.9.1-11.el9_2.2.s390x",
"product_id": "net-snmp-debugsource-1:5.9.1-11.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debugsource@5.9.1-11.el9_2.2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"product": {
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"product_id": "net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.9.1-11.el9_2.2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"product": {
"name": "net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"product_id": "net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.9.1-11.el9_2.2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"product": {
"name": "net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"product_id": "net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.9.1-11.el9_2.2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"product": {
"name": "net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"product_id": "net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.9.1-11.el9_2.2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"product": {
"name": "net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"product_id": "net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.9.1-11.el9_2.2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"product": {
"name": "python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"product_id": "python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-net-snmp-debuginfo@5.9.1-11.el9_2.2?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.9.1-11.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.aarch64"
},
"product_reference": "net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.9.1-11.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.ppc64le"
},
"product_reference": "net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.9.1-11.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.s390x"
},
"product_reference": "net-snmp-1:5.9.1-11.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.9.1-11.el9_2.2.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.src"
},
"product_reference": "net-snmp-1:5.9.1-11.el9_2.2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.9.1-11.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.x86_64"
},
"product_reference": "net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.9.1-11.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.aarch64"
},
"product_reference": "net-snmp-agent-libs-1:5.9.1-11.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.9.1-11.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.i686"
},
"product_reference": "net-snmp-agent-libs-1:5.9.1-11.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.9.1-11.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.ppc64le"
},
"product_reference": "net-snmp-agent-libs-1:5.9.1-11.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.9.1-11.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.s390x"
},
"product_reference": "net-snmp-agent-libs-1:5.9.1-11.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.9.1-11.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.x86_64"
},
"product_reference": "net-snmp-agent-libs-1:5.9.1-11.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64"
},
"product_reference": "net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.i686"
},
"product_reference": "net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le"
},
"product_reference": "net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x"
},
"product_reference": "net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64"
},
"product_reference": "net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64"
},
"product_reference": "net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le"
},
"product_reference": "net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debugsource-1:5.9.1-11.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.aarch64"
},
"product_reference": "net-snmp-debugsource-1:5.9.1-11.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debugsource-1:5.9.1-11.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.i686"
},
"product_reference": "net-snmp-debugsource-1:5.9.1-11.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debugsource-1:5.9.1-11.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.ppc64le"
},
"product_reference": "net-snmp-debugsource-1:5.9.1-11.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debugsource-1:5.9.1-11.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.s390x"
},
"product_reference": "net-snmp-debugsource-1:5.9.1-11.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debugsource-1:5.9.1-11.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.x86_64"
},
"product_reference": "net-snmp-debugsource-1:5.9.1-11.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.9.1-11.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.aarch64"
},
"product_reference": "net-snmp-devel-1:5.9.1-11.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.9.1-11.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.i686"
},
"product_reference": "net-snmp-devel-1:5.9.1-11.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.9.1-11.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.ppc64le"
},
"product_reference": "net-snmp-devel-1:5.9.1-11.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.9.1-11.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.s390x"
},
"product_reference": "net-snmp-devel-1:5.9.1-11.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.9.1-11.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.x86_64"
},
"product_reference": "net-snmp-devel-1:5.9.1-11.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.9.1-11.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.aarch64"
},
"product_reference": "net-snmp-libs-1:5.9.1-11.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.9.1-11.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.i686"
},
"product_reference": "net-snmp-libs-1:5.9.1-11.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.9.1-11.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.ppc64le"
},
"product_reference": "net-snmp-libs-1:5.9.1-11.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.9.1-11.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.s390x"
},
"product_reference": "net-snmp-libs-1:5.9.1-11.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.9.1-11.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.x86_64"
},
"product_reference": "net-snmp-libs-1:5.9.1-11.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64"
},
"product_reference": "net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.i686"
},
"product_reference": "net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le"
},
"product_reference": "net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x"
},
"product_reference": "net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64"
},
"product_reference": "net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.9.1-11.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.aarch64"
},
"product_reference": "net-snmp-perl-1:5.9.1-11.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.9.1-11.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.ppc64le"
},
"product_reference": "net-snmp-perl-1:5.9.1-11.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.9.1-11.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.s390x"
},
"product_reference": "net-snmp-perl-1:5.9.1-11.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.9.1-11.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.x86_64"
},
"product_reference": "net-snmp-perl-1:5.9.1-11.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.aarch64"
},
"product_reference": "net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.i686"
},
"product_reference": "net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.ppc64le"
},
"product_reference": "net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.s390x"
},
"product_reference": "net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.x86_64"
},
"product_reference": "net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.9.1-11.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.aarch64"
},
"product_reference": "net-snmp-utils-1:5.9.1-11.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.9.1-11.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.ppc64le"
},
"product_reference": "net-snmp-utils-1:5.9.1-11.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.9.1-11.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.s390x"
},
"product_reference": "net-snmp-utils-1:5.9.1-11.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.9.1-11.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.x86_64"
},
"product_reference": "net-snmp-utils-1:5.9.1-11.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.aarch64"
},
"product_reference": "net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.i686"
},
"product_reference": "net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.ppc64le"
},
"product_reference": "net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.s390x"
},
"product_reference": "net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.x86_64"
},
"product_reference": "net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-1:5.9.1-11.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.aarch64"
},
"product_reference": "python3-net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-1:5.9.1-11.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.ppc64le"
},
"product_reference": "python3-net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-1:5.9.1-11.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.s390x"
},
"product_reference": "python3-net-snmp-1:5.9.1-11.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-1:5.9.1-11.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.x86_64"
},
"product_reference": "python3-net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64"
},
"product_reference": "python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686"
},
"product_reference": "python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le"
},
"product_reference": "python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x"
},
"product_reference": "python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64"
},
"product_reference": "python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-24805",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-07-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103225"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in net-snmp. A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net-snmp: A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-24805"
},
{
"category": "external",
"summary": "RHBZ#2103225",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103225"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-24805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24805"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24805",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24805"
}
],
"release_date": "2022-07-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-09T18:30:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7875"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "net-snmp: A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access."
},
{
"cve": "CVE-2022-24806",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104759"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in net-snmp. This issue occurs due to improper input validation when simultaneously setting malformed OIDs in the master agent and subagent.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net-snmp: Improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-24806"
},
{
"category": "external",
"summary": "RHBZ#2104759",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104759"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-24806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24806"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24806",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24806"
}
],
"release_date": "2022-07-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-09T18:30:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7875"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "net-snmp: Improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously"
},
{
"cve": "CVE-2022-24807",
"cwe": {
"id": "CWE-1320",
"name": "Improper Protection for Outbound Error Messages and Alert Signals"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104763"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in net-snmp. A malformed OID in a SET request to the SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net-snmp: A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-24807"
},
{
"category": "external",
"summary": "RHBZ#2104763",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104763"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-24807",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24807"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24807",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24807"
}
],
"release_date": "2022-07-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-09T18:30:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7875"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "net-snmp: A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access"
},
{
"cve": "CVE-2022-24808",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in net-snmp. A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net-snmp: A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-24808"
},
{
"category": "external",
"summary": "RHBZ#2104768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104768"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-24808",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24808"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24808",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24808"
}
],
"release_date": "2022-07-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-09T18:30:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7875"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "net-snmp: A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference"
},
{
"cve": "CVE-2022-24809",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104766"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in net-snmp. A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net-snmp: A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-24809"
},
{
"category": "external",
"summary": "RHBZ#2104766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104766"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-24809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24809"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24809",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24809"
}
],
"release_date": "2022-07-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-09T18:30:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7875"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "net-snmp: A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference."
},
{
"cve": "CVE-2022-24810",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104769"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in net-snmp. A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net-snmp: A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-24810"
},
{
"category": "external",
"summary": "RHBZ#2104769",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104769"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-24810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24810"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24810",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24810"
}
],
"release_date": "2022-07-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-09T18:30:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7875"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-debugsource-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-devel-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-libs-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-perl-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:net-snmp-utils-debuginfo-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-1:5.9.1-11.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-net-snmp-debuginfo-1:5.9.1-11.el9_2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "net-snmp: A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference."
}
]
}
RHSA-2024:7260
Vulnerability from csaf_redhat - Published: 2024-09-26 19:12 - Updated: 2026-03-18 02:46A flaw was found in net-snmp. A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access issue.
A flaw was found in net-snmp. This issue occurs due to improper input validation when simultaneously setting malformed OIDs in the master agent and subagent.
A flaw was found in net-snmp. A malformed OID in a SET request to the SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access issue.
A flaw was found in net-snmp. A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference issue.
A flaw was found in net-snmp. A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference issue.
A flaw was found in net-snmp. A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference issue.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for net-snmp is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.\n\nSecurity Fix(es):\n\n* net-snmp: A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access. (CVE-2022-24805)\n\n* : net-snmp: Improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously (CVE-2022-24806)\n\n* net-snmp: A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access (CVE-2022-24807)\n\n* net-snmp: A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference. (CVE-2022-24809)\n\n* net-snmp: A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference (CVE-2022-24808)\n\n* net-snmp: A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference. (CVE-2022-24810)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:7260",
"url": "https://access.redhat.com/errata/RHSA-2024:7260"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2103225",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103225"
},
{
"category": "external",
"summary": "2104759",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104759"
},
{
"category": "external",
"summary": "2104763",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104763"
},
{
"category": "external",
"summary": "2104766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104766"
},
{
"category": "external",
"summary": "2104768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104768"
},
{
"category": "external",
"summary": "2104769",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104769"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_7260.json"
}
],
"title": "Red Hat Security Advisory: net-snmp security update",
"tracking": {
"current_release_date": "2026-03-18T02:46:20+00:00",
"generator": {
"date": "2026-03-18T02:46:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2024:7260",
"initial_release_date": "2024-09-26T19:12:10+00:00",
"revision_history": [
{
"date": "2024-09-26T19:12:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-09-26T19:12:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T02:46:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-1:5.9.1-13.el9_4.3.src",
"product": {
"name": "net-snmp-1:5.9.1-13.el9_4.3.src",
"product_id": "net-snmp-1:5.9.1-13.el9_4.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.9.1-13.el9_4.3?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"product": {
"name": "net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"product_id": "net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.9.1-13.el9_4.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.9.1-13.el9_4.3.aarch64",
"product": {
"name": "net-snmp-agent-libs-1:5.9.1-13.el9_4.3.aarch64",
"product_id": "net-snmp-agent-libs-1:5.9.1-13.el9_4.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.9.1-13.el9_4.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.9.1-13.el9_4.3.aarch64",
"product": {
"name": "net-snmp-devel-1:5.9.1-13.el9_4.3.aarch64",
"product_id": "net-snmp-devel-1:5.9.1-13.el9_4.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.9.1-13.el9_4.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.9.1-13.el9_4.3.aarch64",
"product": {
"name": "net-snmp-libs-1:5.9.1-13.el9_4.3.aarch64",
"product_id": "net-snmp-libs-1:5.9.1-13.el9_4.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.9.1-13.el9_4.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.9.1-13.el9_4.3.aarch64",
"product": {
"name": "net-snmp-perl-1:5.9.1-13.el9_4.3.aarch64",
"product_id": "net-snmp-perl-1:5.9.1-13.el9_4.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.9.1-13.el9_4.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.9.1-13.el9_4.3.aarch64",
"product": {
"name": "net-snmp-utils-1:5.9.1-13.el9_4.3.aarch64",
"product_id": "net-snmp-utils-1:5.9.1-13.el9_4.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.9.1-13.el9_4.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"product": {
"name": "python3-net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"product_id": "python3-net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-net-snmp@5.9.1-13.el9_4.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debugsource-1:5.9.1-13.el9_4.3.aarch64",
"product": {
"name": "net-snmp-debugsource-1:5.9.1-13.el9_4.3.aarch64",
"product_id": "net-snmp-debugsource-1:5.9.1-13.el9_4.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debugsource@5.9.1-13.el9_4.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"product": {
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"product_id": "net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.9.1-13.el9_4.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"product": {
"name": "net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"product_id": "net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.9.1-13.el9_4.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"product": {
"name": "net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"product_id": "net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.9.1-13.el9_4.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"product": {
"name": "net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"product_id": "net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.9.1-13.el9_4.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"product": {
"name": "net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"product_id": "net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.9.1-13.el9_4.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"product": {
"name": "python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"product_id": "python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-net-snmp-debuginfo@5.9.1-13.el9_4.3?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"product": {
"name": "net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"product_id": "net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.9.1-13.el9_4.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.9.1-13.el9_4.3.ppc64le",
"product": {
"name": "net-snmp-agent-libs-1:5.9.1-13.el9_4.3.ppc64le",
"product_id": "net-snmp-agent-libs-1:5.9.1-13.el9_4.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.9.1-13.el9_4.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.9.1-13.el9_4.3.ppc64le",
"product": {
"name": "net-snmp-devel-1:5.9.1-13.el9_4.3.ppc64le",
"product_id": "net-snmp-devel-1:5.9.1-13.el9_4.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.9.1-13.el9_4.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.9.1-13.el9_4.3.ppc64le",
"product": {
"name": "net-snmp-libs-1:5.9.1-13.el9_4.3.ppc64le",
"product_id": "net-snmp-libs-1:5.9.1-13.el9_4.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.9.1-13.el9_4.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.9.1-13.el9_4.3.ppc64le",
"product": {
"name": "net-snmp-perl-1:5.9.1-13.el9_4.3.ppc64le",
"product_id": "net-snmp-perl-1:5.9.1-13.el9_4.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.9.1-13.el9_4.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.9.1-13.el9_4.3.ppc64le",
"product": {
"name": "net-snmp-utils-1:5.9.1-13.el9_4.3.ppc64le",
"product_id": "net-snmp-utils-1:5.9.1-13.el9_4.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.9.1-13.el9_4.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"product": {
"name": "python3-net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"product_id": "python3-net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-net-snmp@5.9.1-13.el9_4.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debugsource-1:5.9.1-13.el9_4.3.ppc64le",
"product": {
"name": "net-snmp-debugsource-1:5.9.1-13.el9_4.3.ppc64le",
"product_id": "net-snmp-debugsource-1:5.9.1-13.el9_4.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debugsource@5.9.1-13.el9_4.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"product": {
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"product_id": "net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.9.1-13.el9_4.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"product": {
"name": "net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"product_id": "net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.9.1-13.el9_4.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"product": {
"name": "net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"product_id": "net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.9.1-13.el9_4.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"product": {
"name": "net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"product_id": "net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.9.1-13.el9_4.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"product": {
"name": "net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"product_id": "net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.9.1-13.el9_4.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"product": {
"name": "python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"product_id": "python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-net-snmp-debuginfo@5.9.1-13.el9_4.3?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"product": {
"name": "net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"product_id": "net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.9.1-13.el9_4.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.9.1-13.el9_4.3.x86_64",
"product": {
"name": "net-snmp-agent-libs-1:5.9.1-13.el9_4.3.x86_64",
"product_id": "net-snmp-agent-libs-1:5.9.1-13.el9_4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.9.1-13.el9_4.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.9.1-13.el9_4.3.x86_64",
"product": {
"name": "net-snmp-devel-1:5.9.1-13.el9_4.3.x86_64",
"product_id": "net-snmp-devel-1:5.9.1-13.el9_4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.9.1-13.el9_4.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.9.1-13.el9_4.3.x86_64",
"product": {
"name": "net-snmp-libs-1:5.9.1-13.el9_4.3.x86_64",
"product_id": "net-snmp-libs-1:5.9.1-13.el9_4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.9.1-13.el9_4.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.9.1-13.el9_4.3.x86_64",
"product": {
"name": "net-snmp-perl-1:5.9.1-13.el9_4.3.x86_64",
"product_id": "net-snmp-perl-1:5.9.1-13.el9_4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.9.1-13.el9_4.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.9.1-13.el9_4.3.x86_64",
"product": {
"name": "net-snmp-utils-1:5.9.1-13.el9_4.3.x86_64",
"product_id": "net-snmp-utils-1:5.9.1-13.el9_4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.9.1-13.el9_4.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"product": {
"name": "python3-net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"product_id": "python3-net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-net-snmp@5.9.1-13.el9_4.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debugsource-1:5.9.1-13.el9_4.3.x86_64",
"product": {
"name": "net-snmp-debugsource-1:5.9.1-13.el9_4.3.x86_64",
"product_id": "net-snmp-debugsource-1:5.9.1-13.el9_4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debugsource@5.9.1-13.el9_4.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"product": {
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"product_id": "net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.9.1-13.el9_4.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"product": {
"name": "net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"product_id": "net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.9.1-13.el9_4.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"product": {
"name": "net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"product_id": "net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.9.1-13.el9_4.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"product": {
"name": "net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"product_id": "net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.9.1-13.el9_4.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"product": {
"name": "net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"product_id": "net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.9.1-13.el9_4.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"product": {
"name": "python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"product_id": "python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-net-snmp-debuginfo@5.9.1-13.el9_4.3?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.9.1-13.el9_4.3.i686",
"product": {
"name": "net-snmp-agent-libs-1:5.9.1-13.el9_4.3.i686",
"product_id": "net-snmp-agent-libs-1:5.9.1-13.el9_4.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.9.1-13.el9_4.3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.9.1-13.el9_4.3.i686",
"product": {
"name": "net-snmp-devel-1:5.9.1-13.el9_4.3.i686",
"product_id": "net-snmp-devel-1:5.9.1-13.el9_4.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.9.1-13.el9_4.3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.9.1-13.el9_4.3.i686",
"product": {
"name": "net-snmp-libs-1:5.9.1-13.el9_4.3.i686",
"product_id": "net-snmp-libs-1:5.9.1-13.el9_4.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.9.1-13.el9_4.3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debugsource-1:5.9.1-13.el9_4.3.i686",
"product": {
"name": "net-snmp-debugsource-1:5.9.1-13.el9_4.3.i686",
"product_id": "net-snmp-debugsource-1:5.9.1-13.el9_4.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debugsource@5.9.1-13.el9_4.3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"product": {
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"product_id": "net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.9.1-13.el9_4.3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"product": {
"name": "net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"product_id": "net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.9.1-13.el9_4.3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"product": {
"name": "net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"product_id": "net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.9.1-13.el9_4.3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.i686",
"product": {
"name": "net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.i686",
"product_id": "net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.9.1-13.el9_4.3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.i686",
"product": {
"name": "net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.i686",
"product_id": "net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.9.1-13.el9_4.3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"product": {
"name": "python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"product_id": "python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-net-snmp-debuginfo@5.9.1-13.el9_4.3?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-1:5.9.1-13.el9_4.3.s390x",
"product": {
"name": "net-snmp-1:5.9.1-13.el9_4.3.s390x",
"product_id": "net-snmp-1:5.9.1-13.el9_4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.9.1-13.el9_4.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-1:5.9.1-13.el9_4.3.s390x",
"product": {
"name": "net-snmp-agent-libs-1:5.9.1-13.el9_4.3.s390x",
"product_id": "net-snmp-agent-libs-1:5.9.1-13.el9_4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.9.1-13.el9_4.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.9.1-13.el9_4.3.s390x",
"product": {
"name": "net-snmp-devel-1:5.9.1-13.el9_4.3.s390x",
"product_id": "net-snmp-devel-1:5.9.1-13.el9_4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.9.1-13.el9_4.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.9.1-13.el9_4.3.s390x",
"product": {
"name": "net-snmp-libs-1:5.9.1-13.el9_4.3.s390x",
"product_id": "net-snmp-libs-1:5.9.1-13.el9_4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.9.1-13.el9_4.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.9.1-13.el9_4.3.s390x",
"product": {
"name": "net-snmp-perl-1:5.9.1-13.el9_4.3.s390x",
"product_id": "net-snmp-perl-1:5.9.1-13.el9_4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.9.1-13.el9_4.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.9.1-13.el9_4.3.s390x",
"product": {
"name": "net-snmp-utils-1:5.9.1-13.el9_4.3.s390x",
"product_id": "net-snmp-utils-1:5.9.1-13.el9_4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.9.1-13.el9_4.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-net-snmp-1:5.9.1-13.el9_4.3.s390x",
"product": {
"name": "python3-net-snmp-1:5.9.1-13.el9_4.3.s390x",
"product_id": "python3-net-snmp-1:5.9.1-13.el9_4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-net-snmp@5.9.1-13.el9_4.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debugsource-1:5.9.1-13.el9_4.3.s390x",
"product": {
"name": "net-snmp-debugsource-1:5.9.1-13.el9_4.3.s390x",
"product_id": "net-snmp-debugsource-1:5.9.1-13.el9_4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debugsource@5.9.1-13.el9_4.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"product": {
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"product_id": "net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.9.1-13.el9_4.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"product": {
"name": "net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"product_id": "net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.9.1-13.el9_4.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"product": {
"name": "net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"product_id": "net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.9.1-13.el9_4.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"product": {
"name": "net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"product_id": "net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.9.1-13.el9_4.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"product": {
"name": "net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"product_id": "net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.9.1-13.el9_4.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"product": {
"name": "python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"product_id": "python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-net-snmp-debuginfo@5.9.1-13.el9_4.3?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.9.1-13.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.aarch64"
},
"product_reference": "net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.9.1-13.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.ppc64le"
},
"product_reference": "net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.9.1-13.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.s390x"
},
"product_reference": "net-snmp-1:5.9.1-13.el9_4.3.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.9.1-13.el9_4.3.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.src"
},
"product_reference": "net-snmp-1:5.9.1-13.el9_4.3.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.9.1-13.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.x86_64"
},
"product_reference": "net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.9.1-13.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.aarch64"
},
"product_reference": "net-snmp-agent-libs-1:5.9.1-13.el9_4.3.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.9.1-13.el9_4.3.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.i686"
},
"product_reference": "net-snmp-agent-libs-1:5.9.1-13.el9_4.3.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.9.1-13.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.ppc64le"
},
"product_reference": "net-snmp-agent-libs-1:5.9.1-13.el9_4.3.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.9.1-13.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.s390x"
},
"product_reference": "net-snmp-agent-libs-1:5.9.1-13.el9_4.3.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-1:5.9.1-13.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.x86_64"
},
"product_reference": "net-snmp-agent-libs-1:5.9.1-13.el9_4.3.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64"
},
"product_reference": "net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.i686"
},
"product_reference": "net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le"
},
"product_reference": "net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x"
},
"product_reference": "net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64"
},
"product_reference": "net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64"
},
"product_reference": "net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686"
},
"product_reference": "net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le"
},
"product_reference": "net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debugsource-1:5.9.1-13.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.aarch64"
},
"product_reference": "net-snmp-debugsource-1:5.9.1-13.el9_4.3.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debugsource-1:5.9.1-13.el9_4.3.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.i686"
},
"product_reference": "net-snmp-debugsource-1:5.9.1-13.el9_4.3.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debugsource-1:5.9.1-13.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.ppc64le"
},
"product_reference": "net-snmp-debugsource-1:5.9.1-13.el9_4.3.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debugsource-1:5.9.1-13.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.s390x"
},
"product_reference": "net-snmp-debugsource-1:5.9.1-13.el9_4.3.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debugsource-1:5.9.1-13.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.x86_64"
},
"product_reference": "net-snmp-debugsource-1:5.9.1-13.el9_4.3.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.9.1-13.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.aarch64"
},
"product_reference": "net-snmp-devel-1:5.9.1-13.el9_4.3.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.9.1-13.el9_4.3.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.i686"
},
"product_reference": "net-snmp-devel-1:5.9.1-13.el9_4.3.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.9.1-13.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.ppc64le"
},
"product_reference": "net-snmp-devel-1:5.9.1-13.el9_4.3.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.9.1-13.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.s390x"
},
"product_reference": "net-snmp-devel-1:5.9.1-13.el9_4.3.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.9.1-13.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.x86_64"
},
"product_reference": "net-snmp-devel-1:5.9.1-13.el9_4.3.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.9.1-13.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.aarch64"
},
"product_reference": "net-snmp-libs-1:5.9.1-13.el9_4.3.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.9.1-13.el9_4.3.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.i686"
},
"product_reference": "net-snmp-libs-1:5.9.1-13.el9_4.3.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.9.1-13.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.ppc64le"
},
"product_reference": "net-snmp-libs-1:5.9.1-13.el9_4.3.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.9.1-13.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.s390x"
},
"product_reference": "net-snmp-libs-1:5.9.1-13.el9_4.3.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.9.1-13.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.x86_64"
},
"product_reference": "net-snmp-libs-1:5.9.1-13.el9_4.3.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64"
},
"product_reference": "net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.i686"
},
"product_reference": "net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le"
},
"product_reference": "net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x"
},
"product_reference": "net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64"
},
"product_reference": "net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.9.1-13.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.aarch64"
},
"product_reference": "net-snmp-perl-1:5.9.1-13.el9_4.3.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.9.1-13.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.ppc64le"
},
"product_reference": "net-snmp-perl-1:5.9.1-13.el9_4.3.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.9.1-13.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.s390x"
},
"product_reference": "net-snmp-perl-1:5.9.1-13.el9_4.3.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.9.1-13.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.x86_64"
},
"product_reference": "net-snmp-perl-1:5.9.1-13.el9_4.3.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.aarch64"
},
"product_reference": "net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.i686"
},
"product_reference": "net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.ppc64le"
},
"product_reference": "net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.s390x"
},
"product_reference": "net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.x86_64"
},
"product_reference": "net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.9.1-13.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.aarch64"
},
"product_reference": "net-snmp-utils-1:5.9.1-13.el9_4.3.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.9.1-13.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.ppc64le"
},
"product_reference": "net-snmp-utils-1:5.9.1-13.el9_4.3.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.9.1-13.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.s390x"
},
"product_reference": "net-snmp-utils-1:5.9.1-13.el9_4.3.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.9.1-13.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.x86_64"
},
"product_reference": "net-snmp-utils-1:5.9.1-13.el9_4.3.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.aarch64"
},
"product_reference": "net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.i686"
},
"product_reference": "net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.ppc64le"
},
"product_reference": "net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.s390x"
},
"product_reference": "net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.x86_64"
},
"product_reference": "net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-1:5.9.1-13.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.aarch64"
},
"product_reference": "python3-net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-1:5.9.1-13.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.ppc64le"
},
"product_reference": "python3-net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-1:5.9.1-13.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.s390x"
},
"product_reference": "python3-net-snmp-1:5.9.1-13.el9_4.3.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-1:5.9.1-13.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.x86_64"
},
"product_reference": "python3-net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64"
},
"product_reference": "python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686"
},
"product_reference": "python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le"
},
"product_reference": "python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x"
},
"product_reference": "python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64"
},
"product_reference": "python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-24805",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-07-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2103225"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in net-snmp. A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net-snmp: A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.src",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-24805"
},
{
"category": "external",
"summary": "RHBZ#2103225",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103225"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-24805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24805"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24805",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24805"
}
],
"release_date": "2022-07-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-26T19:12:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.src",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7260"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.src",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "net-snmp: A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access."
},
{
"cve": "CVE-2022-24806",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104759"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in net-snmp. This issue occurs due to improper input validation when simultaneously setting malformed OIDs in the master agent and subagent.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net-snmp: Improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.src",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-24806"
},
{
"category": "external",
"summary": "RHBZ#2104759",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104759"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-24806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24806"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24806",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24806"
}
],
"release_date": "2022-07-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-26T19:12:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.src",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7260"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.src",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "net-snmp: Improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously"
},
{
"cve": "CVE-2022-24807",
"cwe": {
"id": "CWE-1320",
"name": "Improper Protection for Outbound Error Messages and Alert Signals"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104763"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in net-snmp. A malformed OID in a SET request to the SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net-snmp: A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.src",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-24807"
},
{
"category": "external",
"summary": "RHBZ#2104763",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104763"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-24807",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24807"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24807",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24807"
}
],
"release_date": "2022-07-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-26T19:12:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.src",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7260"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.src",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "net-snmp: A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access"
},
{
"cve": "CVE-2022-24808",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in net-snmp. A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net-snmp: A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.src",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-24808"
},
{
"category": "external",
"summary": "RHBZ#2104768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104768"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-24808",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24808"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24808",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24808"
}
],
"release_date": "2022-07-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-26T19:12:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.src",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7260"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.src",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "net-snmp: A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference"
},
{
"cve": "CVE-2022-24809",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104766"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in net-snmp. A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net-snmp: A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.src",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-24809"
},
{
"category": "external",
"summary": "RHBZ#2104766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104766"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-24809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24809"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24809",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24809"
}
],
"release_date": "2022-07-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-26T19:12:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.src",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7260"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.src",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "net-snmp: A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference."
},
{
"cve": "CVE-2022-24810",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104769"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in net-snmp. A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net-snmp: A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.src",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-24810"
},
{
"category": "external",
"summary": "RHBZ#2104769",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104769"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-24810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24810"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24810",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24810"
}
],
"release_date": "2022-07-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-26T19:12:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.src",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7260"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.src",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-agent-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-debugsource-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-devel-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-libs-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-perl-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:net-snmp-utils-debuginfo-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-1:5.9.1-13.el9_4.3.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-net-snmp-debuginfo-1:5.9.1-13.el9_4.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "net-snmp: A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference."
}
]
}
FKIE_CVE-2022-24805
Vulnerability from fkie_nvd - Published: 2024-04-16 20:15 - Updated: 2025-01-17 16:048.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | https://bugzilla.redhat.com/show_bug.cgi?id=2103225 | Third Party Advisory | |
| security-advisories@github.com | https://bugzilla.redhat.com/show_bug.cgi?id=2105238 | Third Party Advisory | |
| security-advisories@github.com | https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937 | Patch | |
| security-advisories@github.com | https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775 | Patch | |
| security-advisories@github.com | https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html | Third Party Advisory | |
| security-advisories@github.com | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/ | Product | |
| security-advisories@github.com | https://security.gentoo.org/glsa/202210-29 | Third Party Advisory | |
| security-advisories@github.com | https://www.debian.org/security/2022/dsa-5209 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=2103225 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=2105238 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/ | Product | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202210-29 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2022/dsa-5209 | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| net-snmp | net-snmp | * | |
| fedoraproject | fedora | 36 | |
| debian | debian_linux | 10.0 | |
| debian | debian_linux | 11.0 | |
| redhat | enterprise_linux | 9.0 | |
| redhat | enterprise_linux_eus | 9.2 | |
| redhat | enterprise_linux_eus | 9.4 | |
| redhat | enterprise_linux_for_arm_64 | 9.0 | |
| redhat | enterprise_linux_for_arm_64 | 9.2_aarch64 | |
| redhat | enterprise_linux_for_arm_64 | 9.4_aarch64 | |
| redhat | enterprise_linux_for_arm_64_eus | 9.4_aarch64 | |
| redhat | enterprise_linux_for_ibm_z_systems | 9.0 | |
| redhat | enterprise_linux_for_ibm_z_systems | 9.2_s390x | |
| redhat | enterprise_linux_for_ibm_z_systems | 9.4_s390x | |
| redhat | enterprise_linux_for_ibm_z_systems_eus | 9.4_s390x | |
| redhat | enterprise_linux_for_power_little_endian | 9.0 | |
| redhat | enterprise_linux_for_power_little_endian_eus | 9.2_ppc64le | |
| redhat | enterprise_linux_for_power_little_endian_eus | 9.4_ppc64le | |
| redhat | enterprise_linux_server_aus | 9.2 | |
| redhat | enterprise_linux_server_aus | 9.4 | |
| redhat | enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions | 9.2_ppc64le | |
| redhat | enterprise_linux_server_update_services_for_sap_solutions | 9.2 | |
| redhat | enterprise_linux_update_services_for_sap_solutions | 9.4 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79AD3D1F-9090-4939-8C82-E676C8C0FBC7",
"versionEndExcluding": "5.9.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3C74F6FA-FA6C-4648-9079-91446E45EE47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B03506D7-0FCD-47B7-90F6-DDEEB5C5A733",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6B528C5D-0F72-4685-8516-257597E94AE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.2_aarch64:*:*:*:*:*:*:*",
"matchCriteriaId": "D85E0DBA-A856-472A-8271-A4F37C35F952",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.4_aarch64:*:*:*:*:*:*:*",
"matchCriteriaId": "DBF70805-7EBF-4731-83DB-D71F7A646B0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:*",
"matchCriteriaId": "01363FFA-F7A6-43FC-8D47-E67F95410095",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D650BFB9-4FDC-4311-8D7E-D981C8F4FA3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.2_s390x:*:*:*:*:*:*:*",
"matchCriteriaId": "2E068ABB-31C2-416E-974A-95E07A2BAB0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.4_s390x:*:*:*:*:*:*:*",
"matchCriteriaId": "069180B4-BA50-4AD0-8BA9-83F8005E58BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*",
"matchCriteriaId": "F843B777-5C64-4CAE-80D6-89DC2C9515B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "35EEDB95-DCD1-4FED-9BBB-877B2062410C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*",
"matchCriteriaId": "99952557-C766-4B9E-8BF5-DBBA194349FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*",
"matchCriteriaId": "FC3CBA5D-9E5D-4C46-B37E-7BB35BE8DADB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F32CA554-F9D7-425B-8F1C-89678507F28C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "39D345D3-108A-4551-A112-5EE51991411A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.2_ppc64le:*:*:*:*:*:*:*",
"matchCriteriaId": "CC6A25CB-907A-4D05-8460-A2488938A8BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FC7D8E93-D4BE-46E7-BDE7-843BF8A33162",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "18B7F648-9A31-4EE5-A215-C860616A4AB7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the `INDEX` of `NET-SNMP-VACM-MIB` can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n"
},
{
"lang": "es",
"value": "net-snmp proporciona varias herramientas relacionadas con el protocolo simple de administraci\u00f3n de red. Antes de la versi\u00f3n 5.9.2, un desbordamiento del b\u00fafer en el manejo del `INDEX` de `NET-SNMP-VACM-MIB` puede provocar un acceso a la memoria fuera de los l\u00edmites. Un usuario con credenciales de s\u00f3lo lectura puede aprovechar el problema. La versi\u00f3n 5.9.2 contiene un parche. Los usuarios deben utilizar credenciales SNMPv3 seguras y evitar compartirlas. Aquellos que deben utilizar SNMPv1 o SNMPv2c deben utilizar una cadena de comunidad compleja y mejorar la protecci\u00f3n restringiendo el acceso a un rango de direcciones IP determinado."
}
],
"id": "CVE-2022-24805",
"lastModified": "2025-01-17T16:04:56.537",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-04-16T20:15:07.600",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103225"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105238"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html"
},
{
"source": "security-advisories@github.com",
"tags": [
"Product"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202210-29"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2022/dsa-5209"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103225"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105238"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202210-29"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2022/dsa-5209"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-120"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-120"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
OPENSUSE-SU-2024:12174-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libsnmp40-32bit-5.9.2-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libsnmp40-32bit-5.9.2-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-12174",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12174-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-24805 page",
"url": "https://www.suse.com/security/cve/CVE-2022-24805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-24806 page",
"url": "https://www.suse.com/security/cve/CVE-2022-24806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-24807 page",
"url": "https://www.suse.com/security/cve/CVE-2022-24807/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-24808 page",
"url": "https://www.suse.com/security/cve/CVE-2022-24808/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-24809 page",
"url": "https://www.suse.com/security/cve/CVE-2022-24809/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-24810 page",
"url": "https://www.suse.com/security/cve/CVE-2022-24810/"
}
],
"title": "libsnmp40-32bit-5.9.2-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:12174-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libsnmp40-5.9.2-1.1.aarch64",
"product": {
"name": "libsnmp40-5.9.2-1.1.aarch64",
"product_id": "libsnmp40-5.9.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsnmp40-32bit-5.9.2-1.1.aarch64",
"product": {
"name": "libsnmp40-32bit-5.9.2-1.1.aarch64",
"product_id": "libsnmp40-32bit-5.9.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "net-snmp-5.9.2-1.1.aarch64",
"product": {
"name": "net-snmp-5.9.2-1.1.aarch64",
"product_id": "net-snmp-5.9.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.9.2-1.1.aarch64",
"product": {
"name": "net-snmp-devel-5.9.2-1.1.aarch64",
"product_id": "net-snmp-devel-5.9.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-32bit-5.9.2-1.1.aarch64",
"product": {
"name": "net-snmp-devel-32bit-5.9.2-1.1.aarch64",
"product_id": "net-snmp-devel-32bit-5.9.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.9.2-1.1.aarch64",
"product": {
"name": "perl-SNMP-5.9.2-1.1.aarch64",
"product_id": "perl-SNMP-5.9.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python310-net-snmp-5.9.2-1.1.aarch64",
"product": {
"name": "python310-net-snmp-5.9.2-1.1.aarch64",
"product_id": "python310-net-snmp-5.9.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python38-net-snmp-5.9.2-1.1.aarch64",
"product": {
"name": "python38-net-snmp-5.9.2-1.1.aarch64",
"product_id": "python38-net-snmp-5.9.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python39-net-snmp-5.9.2-1.1.aarch64",
"product": {
"name": "python39-net-snmp-5.9.2-1.1.aarch64",
"product_id": "python39-net-snmp-5.9.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.9.2-1.1.aarch64",
"product": {
"name": "snmp-mibs-5.9.2-1.1.aarch64",
"product_id": "snmp-mibs-5.9.2-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libsnmp40-5.9.2-1.1.ppc64le",
"product": {
"name": "libsnmp40-5.9.2-1.1.ppc64le",
"product_id": "libsnmp40-5.9.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsnmp40-32bit-5.9.2-1.1.ppc64le",
"product": {
"name": "libsnmp40-32bit-5.9.2-1.1.ppc64le",
"product_id": "libsnmp40-32bit-5.9.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "net-snmp-5.9.2-1.1.ppc64le",
"product": {
"name": "net-snmp-5.9.2-1.1.ppc64le",
"product_id": "net-snmp-5.9.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.9.2-1.1.ppc64le",
"product": {
"name": "net-snmp-devel-5.9.2-1.1.ppc64le",
"product_id": "net-snmp-devel-5.9.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-32bit-5.9.2-1.1.ppc64le",
"product": {
"name": "net-snmp-devel-32bit-5.9.2-1.1.ppc64le",
"product_id": "net-snmp-devel-32bit-5.9.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.9.2-1.1.ppc64le",
"product": {
"name": "perl-SNMP-5.9.2-1.1.ppc64le",
"product_id": "perl-SNMP-5.9.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python310-net-snmp-5.9.2-1.1.ppc64le",
"product": {
"name": "python310-net-snmp-5.9.2-1.1.ppc64le",
"product_id": "python310-net-snmp-5.9.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python38-net-snmp-5.9.2-1.1.ppc64le",
"product": {
"name": "python38-net-snmp-5.9.2-1.1.ppc64le",
"product_id": "python38-net-snmp-5.9.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-net-snmp-5.9.2-1.1.ppc64le",
"product": {
"name": "python39-net-snmp-5.9.2-1.1.ppc64le",
"product_id": "python39-net-snmp-5.9.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.9.2-1.1.ppc64le",
"product": {
"name": "snmp-mibs-5.9.2-1.1.ppc64le",
"product_id": "snmp-mibs-5.9.2-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libsnmp40-5.9.2-1.1.s390x",
"product": {
"name": "libsnmp40-5.9.2-1.1.s390x",
"product_id": "libsnmp40-5.9.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libsnmp40-32bit-5.9.2-1.1.s390x",
"product": {
"name": "libsnmp40-32bit-5.9.2-1.1.s390x",
"product_id": "libsnmp40-32bit-5.9.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "net-snmp-5.9.2-1.1.s390x",
"product": {
"name": "net-snmp-5.9.2-1.1.s390x",
"product_id": "net-snmp-5.9.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.9.2-1.1.s390x",
"product": {
"name": "net-snmp-devel-5.9.2-1.1.s390x",
"product_id": "net-snmp-devel-5.9.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-32bit-5.9.2-1.1.s390x",
"product": {
"name": "net-snmp-devel-32bit-5.9.2-1.1.s390x",
"product_id": "net-snmp-devel-32bit-5.9.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.9.2-1.1.s390x",
"product": {
"name": "perl-SNMP-5.9.2-1.1.s390x",
"product_id": "perl-SNMP-5.9.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python310-net-snmp-5.9.2-1.1.s390x",
"product": {
"name": "python310-net-snmp-5.9.2-1.1.s390x",
"product_id": "python310-net-snmp-5.9.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python38-net-snmp-5.9.2-1.1.s390x",
"product": {
"name": "python38-net-snmp-5.9.2-1.1.s390x",
"product_id": "python38-net-snmp-5.9.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python39-net-snmp-5.9.2-1.1.s390x",
"product": {
"name": "python39-net-snmp-5.9.2-1.1.s390x",
"product_id": "python39-net-snmp-5.9.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.9.2-1.1.s390x",
"product": {
"name": "snmp-mibs-5.9.2-1.1.s390x",
"product_id": "snmp-mibs-5.9.2-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libsnmp40-5.9.2-1.1.x86_64",
"product": {
"name": "libsnmp40-5.9.2-1.1.x86_64",
"product_id": "libsnmp40-5.9.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsnmp40-32bit-5.9.2-1.1.x86_64",
"product": {
"name": "libsnmp40-32bit-5.9.2-1.1.x86_64",
"product_id": "libsnmp40-32bit-5.9.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "net-snmp-5.9.2-1.1.x86_64",
"product": {
"name": "net-snmp-5.9.2-1.1.x86_64",
"product_id": "net-snmp-5.9.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.9.2-1.1.x86_64",
"product": {
"name": "net-snmp-devel-5.9.2-1.1.x86_64",
"product_id": "net-snmp-devel-5.9.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-32bit-5.9.2-1.1.x86_64",
"product": {
"name": "net-snmp-devel-32bit-5.9.2-1.1.x86_64",
"product_id": "net-snmp-devel-32bit-5.9.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.9.2-1.1.x86_64",
"product": {
"name": "perl-SNMP-5.9.2-1.1.x86_64",
"product_id": "perl-SNMP-5.9.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python310-net-snmp-5.9.2-1.1.x86_64",
"product": {
"name": "python310-net-snmp-5.9.2-1.1.x86_64",
"product_id": "python310-net-snmp-5.9.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python38-net-snmp-5.9.2-1.1.x86_64",
"product": {
"name": "python38-net-snmp-5.9.2-1.1.x86_64",
"product_id": "python38-net-snmp-5.9.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python39-net-snmp-5.9.2-1.1.x86_64",
"product": {
"name": "python39-net-snmp-5.9.2-1.1.x86_64",
"product_id": "python39-net-snmp-5.9.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.9.2-1.1.x86_64",
"product": {
"name": "snmp-mibs-5.9.2-1.1.x86_64",
"product_id": "snmp-mibs-5.9.2-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.aarch64"
},
"product_reference": "libsnmp40-5.9.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.ppc64le"
},
"product_reference": "libsnmp40-5.9.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.s390x"
},
"product_reference": "libsnmp40-5.9.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-5.9.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.x86_64"
},
"product_reference": "libsnmp40-5.9.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-32bit-5.9.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.aarch64"
},
"product_reference": "libsnmp40-32bit-5.9.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-32bit-5.9.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.ppc64le"
},
"product_reference": "libsnmp40-32bit-5.9.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-32bit-5.9.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.s390x"
},
"product_reference": "libsnmp40-32bit-5.9.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp40-32bit-5.9.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.x86_64"
},
"product_reference": "libsnmp40-32bit-5.9.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-5.9.2-1.1.aarch64"
},
"product_reference": "net-snmp-5.9.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-5.9.2-1.1.ppc64le"
},
"product_reference": "net-snmp-5.9.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-5.9.2-1.1.s390x"
},
"product_reference": "net-snmp-5.9.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-5.9.2-1.1.x86_64"
},
"product_reference": "net-snmp-5.9.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.aarch64"
},
"product_reference": "net-snmp-devel-5.9.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.ppc64le"
},
"product_reference": "net-snmp-devel-5.9.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.s390x"
},
"product_reference": "net-snmp-devel-5.9.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.x86_64"
},
"product_reference": "net-snmp-devel-5.9.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-32bit-5.9.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.aarch64"
},
"product_reference": "net-snmp-devel-32bit-5.9.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-32bit-5.9.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.ppc64le"
},
"product_reference": "net-snmp-devel-32bit-5.9.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-32bit-5.9.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.s390x"
},
"product_reference": "net-snmp-devel-32bit-5.9.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-32bit-5.9.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.x86_64"
},
"product_reference": "net-snmp-devel-32bit-5.9.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.aarch64"
},
"product_reference": "perl-SNMP-5.9.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.ppc64le"
},
"product_reference": "perl-SNMP-5.9.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.s390x"
},
"product_reference": "perl-SNMP-5.9.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.x86_64"
},
"product_reference": "perl-SNMP-5.9.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-net-snmp-5.9.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.aarch64"
},
"product_reference": "python310-net-snmp-5.9.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-net-snmp-5.9.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.ppc64le"
},
"product_reference": "python310-net-snmp-5.9.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-net-snmp-5.9.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.s390x"
},
"product_reference": "python310-net-snmp-5.9.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-net-snmp-5.9.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.x86_64"
},
"product_reference": "python310-net-snmp-5.9.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-net-snmp-5.9.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.aarch64"
},
"product_reference": "python38-net-snmp-5.9.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-net-snmp-5.9.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.ppc64le"
},
"product_reference": "python38-net-snmp-5.9.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-net-snmp-5.9.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.s390x"
},
"product_reference": "python38-net-snmp-5.9.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-net-snmp-5.9.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.x86_64"
},
"product_reference": "python38-net-snmp-5.9.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-net-snmp-5.9.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.aarch64"
},
"product_reference": "python39-net-snmp-5.9.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-net-snmp-5.9.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.ppc64le"
},
"product_reference": "python39-net-snmp-5.9.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-net-snmp-5.9.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.s390x"
},
"product_reference": "python39-net-snmp-5.9.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-net-snmp-5.9.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.x86_64"
},
"product_reference": "python39-net-snmp-5.9.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.aarch64"
},
"product_reference": "snmp-mibs-5.9.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.ppc64le"
},
"product_reference": "snmp-mibs-5.9.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.s390x"
},
"product_reference": "snmp-mibs-5.9.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.x86_64"
},
"product_reference": "snmp-mibs-5.9.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-24805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-24805"
}
],
"notes": [
{
"category": "general",
"text": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the `INDEX` of `NET-SNMP-VACM-MIB` can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-24805",
"url": "https://www.suse.com/security/cve/CVE-2022-24805"
},
{
"category": "external",
"summary": "SUSE Bug 1201103 for CVE-2022-24805",
"url": "https://bugzilla.suse.com/1201103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-24805"
},
{
"cve": "CVE-2022-24806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-24806"
}
],
"notes": [
{
"category": "general",
"text": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can exploit an Improper Input Validation vulnerability when SETing malformed OIDs in master agent and subagent simultaneously. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-24806",
"url": "https://www.suse.com/security/cve/CVE-2022-24806"
},
{
"category": "external",
"summary": "SUSE Bug 1201103 for CVE-2022-24806",
"url": "https://bugzilla.suse.com/1201103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-24806"
},
{
"cve": "CVE-2022-24807",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-24807"
}
],
"notes": [
{
"category": "general",
"text": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a malformed OID in a SET request to `SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable` can cause an out-of-bounds memory access. A user with read-write credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-24807",
"url": "https://www.suse.com/security/cve/CVE-2022-24807"
},
{
"category": "external",
"summary": "SUSE Bug 1201103 for CVE-2022-24807",
"url": "https://bugzilla.suse.com/1201103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-24807"
},
{
"cve": "CVE-2022-24808",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-24808"
}
],
"notes": [
{
"category": "general",
"text": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can use a malformed OID in a `SET` request to `NET-SNMP-AGENT-MIB::nsLogTable` to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-24808",
"url": "https://www.suse.com/security/cve/CVE-2022-24808"
},
{
"category": "external",
"summary": "SUSE Bug 1201103 for CVE-2022-24808",
"url": "https://bugzilla.suse.com/1201103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-24808"
},
{
"cve": "CVE-2022-24809",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-24809"
}
],
"notes": [
{
"category": "general",
"text": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-only credentials can use a malformed OID in a `GET-NEXT` to the `nsVacmAccessTable` to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-24809",
"url": "https://www.suse.com/security/cve/CVE-2022-24809"
},
{
"category": "external",
"summary": "SUSE Bug 1201103 for CVE-2022-24809",
"url": "https://bugzilla.suse.com/1201103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-24809"
},
{
"cve": "CVE-2022-24810",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-24810"
}
],
"notes": [
{
"category": "general",
"text": "net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can use a malformed OID in a SET to the nsVacmAccessTable to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-24810",
"url": "https://www.suse.com/security/cve/CVE-2022-24810"
},
{
"category": "external",
"summary": "SUSE Bug 1201103 for CVE-2022-24810",
"url": "https://bugzilla.suse.com/1201103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:libsnmp40-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python310-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python38-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:python39-net-snmp-5.9.2-1.1.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.9.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-24810"
}
]
}
BDU:2024-06509
Vulnerability from fstec - Published: 16.04.2024{
"CVSS 2.0": "AV:N/AC:L/Au:S/C:N/I:C/A:N",
"CVSS 3.0": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, Fedora Project, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\", \u0410\u041e \"\u0420\u0410\u0421\u0423\", \u0410\u041e \u00ab\u041d\u0422\u0426 \u0418\u0422 \u0420\u041e\u0421\u0410\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "8 (Red Hat Enterprise Linux), 10 (Debian GNU/Linux), 11 (Debian GNU/Linux), 12 (Debian GNU/Linux), 7.3 (\u0420\u0415\u0414 \u041e\u0421), 1.7 (Astra Linux Special Edition), 36 (Fedora), 9 (Red Hat Enterprise Linux), \u0434\u043e 2.6 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx), \u043e\u0442 5.9.0 \u0434\u043e 5.9.2 (Net-SNMP), 2.0.1 (\u0423\u0421\u0428 (PBC-01R)), 3.0 (ROSA Virtualization 3.0)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0414\u043b\u044f Net-SNMP:\nhttps://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937 \nhttps://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2022-24805\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/CVE-2022-24805\n\n\u0414\u043b\u044f Fedora:\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux Special Edition 1.7:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 net-snmp \u0434\u043e 5.7.3+dfsg-5+deb10u3 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se17-bulletin-2022-1110SE17\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx: \u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f net-snmp \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 5.7.3+dfsg-5+deb10u3\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u0440\u0435\u0434\u043e\u0439 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0441 \u043f\u043e\u0434\u0441\u0438\u0441\u0442\u0435\u043c\u043e\u0439 \u0431\u0435\u0437\u0430\u0433\u0435\u043d\u0442\u043d\u043e\u0433\u043e \u0440\u0435\u0437\u0435\u0440\u0432\u043d\u043e\u0433\u043e \u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u043c\u0430\u0448\u0438\u043d \u00abROSA Virtualization 3.0\u00bb: https://abf.rosa.ru/advisories/ROSA-SA-2025-2813",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "16.04.2024",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "19.08.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "27.08.2024",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-06509",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-24805",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, Debian GNU/Linux, \u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Fedora, \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913), Net-SNMP, \u0423\u0421\u0428 (PBC-01R), ROSA Virtualization 3.0 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211621308)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 8 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 12 , \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Fedora Project Fedora 36 , Red Hat Inc. Red Hat Enterprise Linux 9 , \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\" \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx \u0434\u043e 2.6 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913), \u0410\u041e \u00ab\u041d\u0422\u0426 \u0418\u0422 \u0420\u041e\u0421\u0410\u00bb ROSA Virtualization 3.0 3.0 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211621308)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 NET-SNMP-VACM-MIB() \u043d\u0430\u0431\u043e\u0440\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Net-SNMP \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043e\u043a\u0430\u0437\u044b\u0432\u0430\u0442\u044c \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u043d\u0430 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u044b",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430 \u0431\u0435\u0437 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0440\u0430\u0437\u043c\u0435\u0440\u0430 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (\u043a\u043b\u0430\u0441\u0441\u0438\u0447\u0435\u0441\u043a\u043e\u0435 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430) (CWE-120)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 NET-SNMP-VACM-MIB() \u043d\u0430\u0431\u043e\u0440\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Net-SNMP \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0431\u0443\u0444\u0435\u0440\u0430 \u0431\u0435\u0437 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0440\u0430\u0437\u043c\u0435\u0440\u0430 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043e\u043a\u0430\u0437\u044b\u0432\u0430\u0442\u044c \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u043d\u0430 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u044b",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937\nhttps://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775\nhttps://redos.red-soft.ru/support/secure/\nhttps://security-tracker.debian.org/tracker/CVE-2022-24805\nhttps://access.redhat.com/security/cve/CVE-2022-24805\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.6/\nhttps://abf.rosa.ru/advisories/ROSA-SA-2025-2813",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-120",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,8)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,5)"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.