-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2022.4075
                         net-snmp security update
                              17 August 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           net-snmp
Publisher:         Debian
Operating System:  Debian GNU/Linux
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-24810 CVE-2022-24809 CVE-2022-24808
                   CVE-2022-24807 CVE-2022-24806 CVE-2022-24805

Original Bulletin: 
   http://www.debian.org/security/2022/dsa-5209

Comment: CVSS (Max):  6.7 CVE-2022-24805 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H)
         CVSS Source: Red Hat
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-5209-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
August 16, 2022                       https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : net-snmp
CVE ID         : CVE-2022-24805 CVE-2022-24806 CVE-2022-24807 CVE-2022-24808
                 CVE-2022-24809 CVE-2022-24810
Debian Bug     : 1016139

Yu Zhang and Nanyu Zhong discovered several vulnerabilities in net-snmp,
a suite of Simple Network Management Protocol applications, which could
result in denial of service or the execution of arbitrary code.

For the stable distribution (bullseye), these problems have been fixed in
version 5.9+dfsg-4+deb11u1.

We recommend that you upgrade your net-snmp packages.

For the detailed security status of net-snmp please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/net-snmp

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=W8n3
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=KtI1
-----END PGP SIGNATURE-----