[CLSA-2025:1745053614] net-snmp: Fix of 2 CVEs
Type:
security
Severity:
Important
Release date:
2025-04-19 09:06:59 UTC
Description:
- CVE-2022-24805: fix buffer overflow issue in handling of the INDEX of NET-SNMP-VACM- MIB that allows out-of-bounds memory access by user with read-only credentials - CVE-2022-24810: fix NULL pointer dereference caused by a user with read-write credentials using a malformed OID in a SET to the nsVacmAccessTable
Updated packages:
  • net-snmp-5.9.1-11.el9_2.tuxcare.els1.x86_64.rpm
    sha:72ecc1ed207895f4109b113b1526b5a9f4324c9d917b91958d6b4dc0a2326f3c
  • net-snmp-agent-libs-5.9.1-11.el9_2.tuxcare.els1.i686.rpm
    sha:0262716f8dfc63755db5259ad06929b75cb35ebbafe2bd525a32cac7654cb22d
  • net-snmp-agent-libs-5.9.1-11.el9_2.tuxcare.els1.x86_64.rpm
    sha:d9d7b94e6259d5d196742269d9a1288c23fdfeb064510691a812df1b3f2fbcfa
  • net-snmp-devel-5.9.1-11.el9_2.tuxcare.els1.i686.rpm
    sha:018b9db8829babb2dba05f1575a85976ce025c79ace303a7f5c296dce67e56b7
  • net-snmp-devel-5.9.1-11.el9_2.tuxcare.els1.x86_64.rpm
    sha:44a6d65b80dbee60bcb20808dbd0e8480e7e0886e553b03fe9e9283c8de15cd3
  • net-snmp-gui-5.9.1-11.el9_2.tuxcare.els1.x86_64.rpm
    sha:37f00d50fb222f9d71aa3bf6912f5a112b06d8cd88bb42ef9efe2fd60cc80e51
  • net-snmp-libs-5.9.1-11.el9_2.tuxcare.els1.i686.rpm
    sha:189c22e84191cc1a7a4137417e69c53a29da34446e3f0e42089cacc0bc8b8414
  • net-snmp-libs-5.9.1-11.el9_2.tuxcare.els1.x86_64.rpm
    sha:ffa91fff834853b9d3568734aee3b0cb4dfae5390311822c57188a55b44de000
  • net-snmp-perl-5.9.1-11.el9_2.tuxcare.els1.x86_64.rpm
    sha:17738ebdc6123b15ed8103643c45507e7fdbc67b14e8f06e3f9e3d5a3c780332
  • net-snmp-utils-5.9.1-11.el9_2.tuxcare.els1.x86_64.rpm
    sha:1b156ce3775a5376ccf7c94e5fdc1b8ddb781ff6952551c0efebbbd1730e206b
  • python3-net-snmp-5.9.1-11.el9_2.tuxcare.els1.x86_64.rpm
    sha:b031cf6e95f4a21e670fa52c07667eb75badb43fe632c3e15bf6b0fc86e65fbe
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.