File _patchinfo of Package patchinfo.27328
<patchinfo incident="27328">
<issue tracker="bnc" id="1205148">VUL-0: CVE-2022-44793: net-snmp-openssl1,net-snmp: remote attacker with write access can cause a NULL pointer dereference in handle_ipv6IpForwarding()</issue>
<issue tracker="bnc" id="1205150">VUL-0: CVE-2022-44792: net-snmp,net-snmp-openssl1: remote attacker with write access can cause a NULL pointer dereference in handle_ipDefaultTTL()</issue>
<issue tracker="bnc" id="1198059">net-snmp-5.7.3-6.6.1 - fault with threads usage</issue>
<issue tracker="cve" id="2022-44792"/>
<issue tracker="cve" id="2022-44793"/>
<packager>abergmann</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for net-snmp</summary>
<description>This update for net-snmp fixes the following issues:
- CVE-2022-44793: Fixed a NULL pointer dereference issue that could
allow a remote attacker with write access to crash the server
instance (bsc#1205148).
- CVE-2022-44792: Fixed a NULL pointer dereference issue that could
allow a remote attacker with write access to crash the server
instance (bsc#1205150).
Other fixes:
- Fixed a potential invalid free of memory, and hardened string handling
against concurrency issues (bsc#1198059).
</description>
</patchinfo>