{"id":"MGASA-2014-0019","summary":"Updated net-snmp packages fix CVE-2012-6151","details":"Updated net-snmp packages fix security vulnerability:\n\nNet-SNMP 5.7.1 and earlier, when AgentX is registering to handle a MIB and\nprocessing GETNEXT requests, allows remote attackers to cause a denial of\nservice (crash or infinite loop, CPU consumption, and hang) by causing the\nAgentX subagent to timeout (CVE-2012-6151).\n\nThis update also fixes two other minor issues: IPADDRESS size in\npython-netsnmp on 64-bit systems and adding btrfs support to hrFSTable.\n","modified":"2026-04-16T01:47:25.361489165Z","published":"2014-01-21T16:16:21Z","upstream":["CVE-2012-6151"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2014-0019.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/pipermail/package-announce/2014-January/125828.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/pipermail/package-announce/2013-January/097794.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/pipermail/package-announce/2013-January/097794.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=12236"}],"affected":[{"package":{"name":"net-snmp","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/net-snmp?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.7.2-7.1.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0019.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}