An attacker with physical access to the victim's device may bypass the application's password/pin lock to access user data. This is possible due to lack of adequate security controls to prevent dynamic code manipulation. Reference: https://fluidattacks.com/advisories/tempest/
Created perl-SNMP_Session tracking bugs for this issue: Affects: fedora-all [bug 2106293]
CVE-2022-1955 is not about perl-SNMP_Session <https://github.com/sleinen/snmp-session>, a SNMP protocol in Perl language. This vulnerability <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1955> is in <https://github.com/oxen-io/session-android>, a messaging application for Android OS using Oxen mixing network. I believe that neither Fedora, nor RHEL deliver this piece of software and this bug report can be closed.
Agree, This one is not related to perl-snmp-session. It is something related to oxen-io/session-android package which does not shipped in RHEL and not even Fedora. I'm closing out this bug.