Mageia 2023-0015: net-snmp security update
Summary
handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.8
through 5.9.3 has a NULL Pointer Exception bug that can be used by a
remote attacker (who has write access) to cause the instance to crash via
a crafted UDP packet, resulting in Denial of Service. (CVE-2022-44792)
handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP
5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a
remote attacker to cause the instance to crash via a crafted UDP packet,
resulting in Denial of Service. (CVE-2022-44793)
References
- https://bugs.mageia.org/show_bug.cgi?id=31388
- https://ubuntu.com/security/notices/USN-5795-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44792
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44793
Resolution
MGASA-2023-0015 - Updated net-snmp packages fix security vulnerability
SRPMS
- 8/core/net-snmp-5.9-1.2.mga8