Affected packages

Ubuntu:18.04:LTS / net-snmp

Package

Name
net-snmp
Purl
pkg:deb/ubuntu/net-snmp@5.7.3+dfsg-1.8ubuntu3.7?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.7.3+dfsg-1.8ubuntu3.7

Affected versions

5.*

5.7.3+dfsg-1.7ubuntu1
5.7.3+dfsg-1.8ubuntu1
5.7.3+dfsg-1.8ubuntu2
5.7.3+dfsg-1.8ubuntu3
5.7.3+dfsg-1.8ubuntu3.1
5.7.3+dfsg-1.8ubuntu3.2
5.7.3+dfsg-1.8ubuntu3.3
5.7.3+dfsg-1.8ubuntu3.5
5.7.3+dfsg-1.8ubuntu3.6

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "5.7.3+dfsg-1.8ubuntu3.7",
            "binary_name": "libsnmp-base"
        },
        {
            "binary_version": "5.7.3+dfsg-1.8ubuntu3.7",
            "binary_name": "libsnmp-dev"
        },
        {
            "binary_version": "5.7.3+dfsg-1.8ubuntu3.7",
            "binary_name": "libsnmp-perl"
        },
        {
            "binary_version": "5.7.3+dfsg-1.8ubuntu3.7",
            "binary_name": "libsnmp30"
        },
        {
            "binary_version": "5.7.3+dfsg-1.8ubuntu3.7",
            "binary_name": "python-netsnmp"
        },
        {
            "binary_version": "5.7.3+dfsg-1.8ubuntu3.7",
            "binary_name": "snmp"
        },
        {
            "binary_version": "5.7.3+dfsg-1.8ubuntu3.7",
            "binary_name": "snmpd"
        },
        {
            "binary_version": "5.7.3+dfsg-1.8ubuntu3.7",
            "binary_name": "snmptrapd"
        },
        {
            "binary_version": "5.7.3+dfsg-1.8ubuntu3.7",
            "binary_name": "tkmib"
        }
    ]
}

Database specific

cves_map

{
    "ecosystem": "Ubuntu:18.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-24805"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-24806"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-24807"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-24808"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-24809"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-24810"
        }
    ]
}

Ubuntu:20.04:LTS / net-snmp

Package

Name
net-snmp
Purl
pkg:deb/ubuntu/net-snmp@5.8+dfsg-2ubuntu2.4?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.8+dfsg-2ubuntu2.4

Affected versions

5.*

5.7.3+dfsg-5ubuntu5
5.7.3+dfsg-5ubuntu6
5.8+dfsg-2ubuntu1
5.8+dfsg-2ubuntu2
5.8+dfsg-2ubuntu2.1
5.8+dfsg-2ubuntu2.2
5.8+dfsg-2ubuntu2.3

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "5.8+dfsg-2ubuntu2.4",
            "binary_name": "libsnmp-base"
        },
        {
            "binary_version": "5.8+dfsg-2ubuntu2.4",
            "binary_name": "libsnmp-dev"
        },
        {
            "binary_version": "5.8+dfsg-2ubuntu2.4",
            "binary_name": "libsnmp-perl"
        },
        {
            "binary_version": "5.8+dfsg-2ubuntu2.4",
            "binary_name": "libsnmp35"
        },
        {
            "binary_version": "5.8+dfsg-2ubuntu2.4",
            "binary_name": "snmp"
        },
        {
            "binary_version": "5.8+dfsg-2ubuntu2.4",
            "binary_name": "snmpd"
        },
        {
            "binary_version": "5.8+dfsg-2ubuntu2.4",
            "binary_name": "snmptrapd"
        },
        {
            "binary_version": "5.8+dfsg-2ubuntu2.4",
            "binary_name": "tkmib"
        }
    ]
}

Database specific

cves_map

{
    "ecosystem": "Ubuntu:20.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-24805"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-24806"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-24807"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-24808"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-24809"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-24810"
        }
    ]
}

Ubuntu:22.04:LTS / net-snmp

Package

Name
net-snmp
Purl
pkg:deb/ubuntu/net-snmp@5.9.1+dfsg-1ubuntu2.2?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.9.1+dfsg-1ubuntu2.2

Affected versions

5.*

5.9+dfsg-3ubuntu2
5.9+dfsg-3ubuntu3
5.9+dfsg-3ubuntu4
5.9.1+dfsg-1ubuntu1
5.9.1+dfsg-1ubuntu2
5.9.1+dfsg-1ubuntu2.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "5.9.1+dfsg-1ubuntu2.2",
            "binary_name": "libnetsnmptrapd40"
        },
        {
            "binary_version": "5.9.1+dfsg-1ubuntu2.2",
            "binary_name": "libsnmp-base"
        },
        {
            "binary_version": "5.9.1+dfsg-1ubuntu2.2",
            "binary_name": "libsnmp-dev"
        },
        {
            "binary_version": "5.9.1+dfsg-1ubuntu2.2",
            "binary_name": "libsnmp-perl"
        },
        {
            "binary_version": "5.9.1+dfsg-1ubuntu2.2",
            "binary_name": "libsnmp40"
        },
        {
            "binary_version": "5.9.1+dfsg-1ubuntu2.2",
            "binary_name": "snmp"
        },
        {
            "binary_version": "5.9.1+dfsg-1ubuntu2.2",
            "binary_name": "snmpd"
        },
        {
            "binary_version": "5.9.1+dfsg-1ubuntu2.2",
            "binary_name": "snmptrapd"
        },
        {
            "binary_version": "5.9.1+dfsg-1ubuntu2.2",
            "binary_name": "tkmib"
        }
    ]
}

Database specific

cves_map

{
    "ecosystem": "Ubuntu:22.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-24805"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-24806"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-24807"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-24808"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-24809"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-24810"
        }
    ]
}