-
Notifications
You must be signed in to change notification settings - Fork 0
/
USN-5795-2.json
127 lines (127 loc) · 3.87 KB
/
USN-5795-2.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
{
"id": "USN-5795-2",
"summary": "net-snmp vulnerabilities",
"details": "USN-5795-1 and 5543-1 fixed several vulnerabilities in Net-SNMP. This update provides\nthe corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.\n\nOriginal advisory details:\n\n It was discovered that Net-SNMP incorrectly handled certain requests. A\n remote attacker could possibly use these issues to cause Net-SNMP to crash,\n resulting in a denial of service.\n\n Yu Zhang and Nanyu Zhong discovered that Net-SNMP incorrectly handled\n memory operations when processing certain requests. A remote attacker could\n use this issue to cause Net-SNMP to crash, resulting in a denial of\n service, or possibly execute arbitrary code.\n",
"aliases": [],
"related": [
"CVE-2022-24805",
"CVE-2022-24806",
"CVE-2022-24807",
"CVE-2022-24808",
"CVE-2022-24809",
"CVE-2022-24810",
"CVE-2022-44792",
"CVE-2022-44793"
],
"published": "2023-01-16T12:18:48.489891Z",
"modified": "2023-01-16T12:18:48.489891Z",
"affected": [
{
"package": {
"ecosystem": "Ubuntu:Pro:14.04:LTS",
"name": "net-snmp"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "5.7.2~dfsg-8.1ubuntu3.3+esm3"
}
]
}
],
"ecosystem_specific": {
"binaries": [
{
"libsnmp-perl": "5.7.2~dfsg-8.1ubuntu3.3+esm3",
"libsnmp-dev": "5.7.2~dfsg-8.1ubuntu3.3+esm3",
"libsnmp-base": "5.7.2~dfsg-8.1ubuntu3.3+esm3",
"snmp": "5.7.2~dfsg-8.1ubuntu3.3+esm3",
"libsnmp30": "5.7.2~dfsg-8.1ubuntu3.3+esm3",
"tkmib": "5.7.2~dfsg-8.1ubuntu3.3+esm3",
"snmpd": "5.7.2~dfsg-8.1ubuntu3.3+esm3",
"python-netsnmp": "5.7.2~dfsg-8.1ubuntu3.3+esm3"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}
},
{
"package": {
"ecosystem": "Ubuntu:Pro:16.04:LTS",
"name": "net-snmp"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "5.7.3+dfsg-1ubuntu4.6+esm1"
}
]
}
],
"ecosystem_specific": {
"binaries": [
{
"snmptrapd": "5.7.3+dfsg-1ubuntu4.6+esm1",
"libsnmp-perl": "5.7.3+dfsg-1ubuntu4.6+esm1",
"libsnmp-dev": "5.7.3+dfsg-1ubuntu4.6+esm1",
"libsnmp-base": "5.7.3+dfsg-1ubuntu4.6+esm1",
"snmp": "5.7.3+dfsg-1ubuntu4.6+esm1",
"libsnmp30": "5.7.3+dfsg-1ubuntu4.6+esm1",
"tkmib": "5.7.3+dfsg-1ubuntu4.6+esm1",
"snmpd": "5.7.3+dfsg-1ubuntu4.6+esm1",
"python-netsnmp": "5.7.3+dfsg-1ubuntu4.6+esm1"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://ubuntu.com/security/notices/USN-5795-2"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2022-24805"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2022-24806"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2022-24807"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2022-24808"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2022-24809"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2022-24810"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2022-44792"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2022-44793"
}
]
}