handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service. https://github.com/net-snmp/net-snmp/issues/475 https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f
Created net-snmp tracking bugs for this issue: Affects: fedora-35 [bug 2141903] Affects: fedora-36 [bug 2141904]
Patch https://github.com/net-snmp/net-snmp/commit/be804106fd0771a7d05236cff36e199af077af57
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2444 https://access.redhat.com/errata/RHSA-2023:2444
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:2969 https://access.redhat.com/errata/RHSA-2023:2969
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-44793