On Fri, 30 Dec 2022 at 18:33, Salvatore Bonaccorso wrote:
> Upstream has addressed both issues with
> https://github.com/net-snmp/net-snmp/commit/be804106fd0771a7d05236cff36e199af077af57
I've made a debian patch and uploaded 5.9.3+dfsg-2 that has this fix.
- Craig
Hi,
On Sun, Nov 13, 2022 at 08:35:33PM +0100, Moritz Mühlenhoff wrote:
> Source: net-snmp
> X-Debbugs-CC: t...@security.debian.org
> Severity: important
> Tags: security
>
> Hi,
>
> The following vulnerabilities were published for net-snmp.
>
> CVE-2022-44792[0]:
> | handle_ipDefaultTTL in
Source: net-snmp
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security
Hi,
The following vulnerabilities were published for net-snmp.
CVE-2022-44792[0]:
| handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP
| 5.8 through 5.9.3 has a NULL Pointer Exception
3 matches
Mail list logo