diff --git a/SOURCES/net-snmp-5.8-CVE-2022-44792-44793.patch b/SOURCES/net-snmp-5.8-CVE-2022-44792-44793.patch
new file mode 100644
index 0000000..4b48b14
--- /dev/null
+++ b/SOURCES/net-snmp-5.8-CVE-2022-44792-44793.patch
@@ -0,0 +1,129 @@
+From 4589352dac3ae111c7621298cf231742209efd9b Mon Sep 17 00:00:00 2001
+From: Bill Fenner <fenner@gmail.com>
+Date: Fri, 25 Nov 2022 08:41:24 -0800
+Subject: [PATCH 1/3] snmp_agent: disallow SET with NULL varbind
+
+---
+ agent/snmp_agent.c | 32 ++++++++++++++++++++++++++++++++
+ 1 file changed, 32 insertions(+)
+
+diff --git a/agent/snmp_agent.c b/agent/snmp_agent.c
+index 867d0c166f..3f678fe2df 100644
+--- a/agent/snmp_agent.c
++++ b/agent/snmp_agent.c
+@@ -3719,12 +3719,44 @@ netsnmp_handle_request(netsnmp_agent_session *asp, int status)
+     return 1;
+ }
+ 
++static int
++check_set_pdu_for_null_varbind(netsnmp_agent_session *asp)
++{
++    int i;
++    netsnmp_variable_list *v = NULL;
++
++    for (i = 1, v = asp->pdu->variables; v != NULL; i++, v = v->next_variable) {
++	if (v->type == ASN_NULL) {
++	    /*
++	     * Protect SET implementations that do not protect themselves
++	     * against wrong type.
++	     */
++	    DEBUGMSGTL(("snmp_agent", "disallowing SET with NULL var for varbind %d\n", i));
++	    asp->index = i;
++	    return SNMP_ERR_WRONGTYPE;
++	}
++    }
++    return SNMP_ERR_NOERROR;
++}
++
+ int
+ handle_pdu(netsnmp_agent_session *asp)
+ {
+     int             status, inclusives = 0;
+     netsnmp_variable_list *v = NULL;
+ 
++#ifndef NETSNMP_NO_WRITE_SUPPORT
++    /*
++     * Check for ASN_NULL in SET request
++     */
++    if (asp->pdu->command == SNMP_MSG_SET) {
++	status = check_set_pdu_for_null_varbind(asp);
++	if (status != SNMP_ERR_NOERROR) {
++	    return status;
++	}
++    }
++#endif /* NETSNMP_NO_WRITE_SUPPORT */
++
+     /*
+      * for illegal requests, mark all nodes as ASN_NULL 
+      */
+
+From 7f4ac4051cc7fec6a5944661923acb95cec359c7 Mon Sep 17 00:00:00 2001
+From: Bill Fenner <fenner@gmail.com>
+Date: Fri, 25 Nov 2022 08:41:46 -0800
+Subject: [PATCH 2/3] apps: snmpset: allow SET with NULL varbind for testing
+
+---
+ apps/snmpset.c | 1 +
+ 1 file changed, 1 insertion(+)
+
+diff --git a/apps/snmpset.c b/apps/snmpset.c
+index 48e14bd513..d542713e1b 100644
+--- a/apps/snmpset.c
++++ b/apps/snmpset.c
+@@ -182,6 +182,7 @@ main(int argc, char *argv[])
+             case 'x':
+             case 'd':
+             case 'b':
++            case 'n': /* undocumented */
+ #ifdef NETSNMP_WITH_OPAQUE_SPECIAL_TYPES
+             case 'I':
+             case 'U':
+
+From 15f9d7f7e5b90c9b419832ed8e6413feb6570d83 Mon Sep 17 00:00:00 2001
+From: Bill Fenner <fenner@gmail.com>
+Date: Fri, 25 Nov 2022 10:23:32 -0800
+Subject: [PATCH 3/3] Add test for NULL varbind set
+
+---
+ .../default/T0142snmpv2csetnull_simple        | 31 +++++++++++++++++++
+ 1 file changed, 31 insertions(+)
+ create mode 100644 testing/fulltests/default/T0142snmpv2csetnull_simple
+
+diff --git a/testing/fulltests/default/T0142snmpv2csetnull_simple b/testing/fulltests/default/T0142snmpv2csetnull_simple
+new file mode 100644
+index 0000000000..0f1b8f386b
+--- /dev/null
++++ b/testing/fulltests/default/T0142snmpv2csetnull_simple
+@@ -0,0 +1,31 @@
++#!/bin/sh
++
++. ../support/simple_eval_tools.sh
++
++HEADER SNMPv2c set of system.sysContact.0 with NULL varbind
++
++SKIPIF NETSNMP_DISABLE_SET_SUPPORT
++SKIPIF NETSNMP_NO_WRITE_SUPPORT
++SKIPIF NETSNMP_DISABLE_SNMPV2C
++SKIPIFNOT USING_MIBII_SYSTEM_MIB_MODULE
++
++#
++# Begin test
++#
++
++# standard V2C configuration: testcomunnity
++snmp_write_access='all'
++. ./Sv2cconfig
++STARTAGENT
++
++CAPTURE "snmpget -On $SNMP_FLAGS -c testcommunity -v 2c $SNMP_TRANSPORT_SPEC:$SNMP_TEST_DEST$SNMP_SNMPD_PORT .1.3.6.1.2.1.1.4.0"
++
++CHECK ".1.3.6.1.2.1.1.4.0 = STRING:"
++
++CAPTURE "snmpset -On $SNMP_FLAGS -c testcommunity -v 2c $SNMP_TRANSPORT_SPEC:$SNMP_TEST_DEST$SNMP_SNMPD_PORT .1.3.6.1.2.1.1.4.0 n x"
++
++CHECK "Reason: wrongType"
++
++STOPAGENT
++
++FINISHED
+
diff --git a/SOURCES/net-snmp-5.8-dev-mem-leak.patch b/SOURCES/net-snmp-5.8-dev-mem-leak.patch
new file mode 100644
index 0000000..9833f9c
--- /dev/null
+++ b/SOURCES/net-snmp-5.8-dev-mem-leak.patch
@@ -0,0 +1,35 @@
+From 8bb544fbd2d6986a9b73d3fab49235a4baa96c23 Mon Sep 17 00:00:00 2001
+From: Bart Van Assche <bvanassche@acm.org>
+Date: Sat, 31 Jul 2021 16:21:16 -0700
+Subject: [PATCH] Linux: IF-MIB: Fix a memory leak
+
+The Linux kernel regenerates proc files in their entirety every time a 4 KiB
+boundary is crossed. This can result in reading the same network interface
+twice if network information changes while it is being read. Fix a memory
+leak that can be triggered if /proc/net/dev changes while being read.
+---
+ agent/mibgroup/if-mib/data_access/interface_linux.c | 10 +++++++++-
+ 1 file changed, 9 insertions(+), 1 deletion(-)
+
+diff --git a/agent/mibgroup/if-mib/data_access/interface_linux.c b/agent/mibgroup/if-mib/data_access/interface_linux.c
+index e99360a216..215b30e806 100644
+--- a/agent/mibgroup/if-mib/data_access/interface_linux.c
++++ b/agent/mibgroup/if-mib/data_access/interface_linux.c
+@@ -921,7 +921,15 @@ netsnmp_arch_interface_container_load(netsnmp_container* container,
+         /*
+          * add to container
+          */
+-        CONTAINER_INSERT(container, entry);
++        if (CONTAINER_INSERT(container, entry) != 0) {
++            netsnmp_interface_entry *existing =
++                CONTAINER_FIND(container, entry);
++            NETSNMP_LOGONCE((LOG_WARNING,
++                             "Encountered interface with index %" NETSNMP_PRIz "u twice: %s <> %s",
++                             entry->index, existing ? existing->name : "(?)",
++                             entry->name));
++            netsnmp_access_interface_entry_free(entry);
++        }
+     }
+ #ifdef NETSNMP_ENABLE_IPV6
+     netsnmp_access_ipaddress_container_free(addr_container, 0);
+
diff --git a/SOURCES/net-snmp-5.8-ipv6-disable-leak.patch b/SOURCES/net-snmp-5.8-ipv6-disable-leak.patch
new file mode 100644
index 0000000..aa9718f
--- /dev/null
+++ b/SOURCES/net-snmp-5.8-ipv6-disable-leak.patch
@@ -0,0 +1,38 @@
+diff -up net-snmp-5.7.2/agent/mibgroup/ip-mib/data_access/systemstats_linux.c.rhbz2134359 net-snmp-5.7.2/agent/mibgroup/ip-mib/data_access/systemstats_linux.c
+--- net-snmp-5.7.2/agent/mibgroup/ip-mib/data_access/systemstats_linux.c.rhbz2134359	2022-10-13 11:10:12.206072210 +0200
++++ net-snmp-5.7.2/agent/mibgroup/ip-mib/data_access/systemstats_linux.c	2022-10-13 11:10:40.893111569 +0200
+@@ -566,6 +566,7 @@ _systemstats_v6_load_systemstats(netsnmp
+         DEBUGMSGTL(("access:systemstats",
+                 "Failed to load Systemstats Table (linux1), cannot open %s\n",
+                 filename));
++        netsnmp_access_systemstats_entry_free(entry);
+         return 0;
+     }
+     
+diff --git a/agent/mibgroup/ucd-snmp/lmsensorsMib.c b/agent/mibgroup/ucd-snmp/lmsensorsMib.c
+index f709812fdc..ef93eeedc9 100644
+--- a/agent/mibgroup/ucd-snmp/lmsensorsMib.c
++++ b/agent/mibgroup/ucd-snmp/lmsensorsMib.c
+@@ -94,7 +94,9 @@ initialize_lmSensorsTable(const char *tableName, const oid *tableOID,
+     netsnmp_table_helper_add_indexes(table_info, ASN_INTEGER, 0);
+     table_info->min_column = COLUMN_LMSENSORS_INDEX;
+     table_info->max_column = COLUMN_LMSENSORS_VALUE;
+-    netsnmp_container_table_register( reg, table_info, container, 0 );
++    if (netsnmp_container_table_register(reg, table_info, container, 0) !=
++        SNMPERR_SUCCESS)
++        return;
+ 
+     /*
+      * If the HAL sensors module was configured as an on-demand caching
+diff -up net-snmp-5.7.2/snmplib/snmp_logging.c.rhbz2134359 net-snmp-5.7.2/snmplib/snmp_logging.c
+--- net-snmp-5.7.2/snmplib/snmp_logging.c.rhbz2134359	2022-10-13 11:11:25.599172905 +0200
++++ net-snmp-5.7.2/snmplib/snmp_logging.c	2022-10-13 11:12:26.986257126 +0200
+@@ -534,7 +534,7 @@ snmp_log_options(char *optarg, int argc,
+ char *
+ snmp_log_syslogname(const char *pstr)
+ {
+-  if (pstr)
++  if (pstr && (pstr != syslogname))
+     strlcpy (syslogname, pstr, sizeof(syslogname));
+ 
+   return syslogname;
diff --git a/SOURCES/net-snmp-5.8-proxy-time-out.patch b/SOURCES/net-snmp-5.8-proxy-time-out.patch
new file mode 100644
index 0000000..3a9d0f7
--- /dev/null
+++ b/SOURCES/net-snmp-5.8-proxy-time-out.patch
@@ -0,0 +1,33 @@
+From 6fd7499ccaafdf244a74306972562b2091cb91b1 Mon Sep 17 00:00:00 2001
+From: fisabelle <fisabelle@broadsoft.com>
+Date: Thu, 9 Jul 2020 15:49:35 -0400
+Subject: [PATCH] Issue#147: Net-SNMP not responding when proxy requests times
+ out
+
+---
+ agent/mibgroup/ucd-snmp/proxy.c | 11 +++++++++++
+ 1 file changed, 11 insertions(+)
+
+diff --git a/agent/mibgroup/ucd-snmp/proxy.c b/agent/mibgroup/ucd-snmp/proxy.c
+index 24ae9322bd..e0ee96b29a 100644
+--- a/agent/mibgroup/ucd-snmp/proxy.c
++++ b/agent/mibgroup/ucd-snmp/proxy.c
+@@ -572,6 +572,17 @@ proxy_got_response(int operation, netsnmp_session * sess, int reqid,
+     }
+ 
+     switch (operation) {
++    case NETSNMP_CALLBACK_OP_RESEND:
++         /*
++         * Issue#147: Net-SNMP not responding when proxy requests times out
++         *
++         * When snmp_api issue a resend, the default case was hit and the 
++         * delagated cache was freed.
++         * As a result, the NETSNMP_CALLBACK_OP_TIMED_OUT never came in.
++         */
++        DEBUGMSGTL(("proxy", "pdu has been resent for request = %8p\n", requests));
++        return SNMP_ERR_NOERROR;
++
+     case NETSNMP_CALLBACK_OP_TIMED_OUT:
+         /*
+          * WWWXXX: don't leave requests delayed if operation is
+
diff --git a/SPECS/net-snmp.spec b/SPECS/net-snmp.spec
index 40bfd69..9c7f998 100644
--- a/SPECS/net-snmp.spec
+++ b/SPECS/net-snmp.spec
@@ -10,7 +10,7 @@
 Summary:    A collection of SNMP protocol tools and libraries
 Name:       net-snmp
 Version:    5.8
-Release:    25%{?dist}.1
+Release:    27%{?dist}
 Epoch:      1
 
 License:    BSD
@@ -72,6 +72,10 @@ Patch43:    net-snmp-5.8-certs.patch
 Patch44:    net-snmp-5.8-util-fix.patch
 Patch45:    net-snmp-5.8-deleted-iface.patch
 Patch46:    net-snmp-5.8-memleak-backport.patch
+Patch47:    net-snmp-5.8-dev-mem-leak.patch
+Patch48:    net-snmp-5.8-CVE-2022-44792-44793.patch
+Patch49:    net-snmp-5.8-ipv6-disable-leak.patch
+Patch50:    net-snmp-5.8-proxy-time-out.patch
 
 # Modern RPM API means at least EL6
 Patch101:   net-snmp-5.8-modern-rpm-api.patch
@@ -243,6 +247,10 @@ rm -r python
 %patch44 -p1 -b .utils
 %patch45 -p1 -b .ifaces
 %patch46 -p1 -b .memleak-backport
+%patch47 -p1 -b .dev-mem-leak
+%patch48 -p1 
+%patch49 -p1 -b .ipv6-disable-leak
+%patch50 -p1 -b .proxy-time-out
 
 %patch101 -p1 -b .modern-rpm-api
 
@@ -497,8 +505,14 @@ LD_LIBRARY_PATH=%{buildroot}/%{_libdir} make test
 %{_libdir}/libnetsnmptrapd*.so.%{soname}*
 
 %changelog
-* Tue Oct 18 2022 Josef Ridky <jridky@redhat.com> - 1:5.8-25.1
-- backport memory leak fixes (#2134764)
+* Tue Jan 31 2023 Josef Ridky <jridky@redhat.com> - 1:5.8-27
+- fix memory leak due of proc file creating (#2105957)
+- fix CVE-2022-44792 and CVE-2022-44793 (#2141901) and (#2141905)
+- fix memory leak when ipv6 disable set to 1 (#2151537)
+- fix proxy timeout issue (#2160723)
+
+* Mon Oct 17 2022 Josef Ridky <jridky@redhat.com> - 1:5.8-26
+- backport two memory leaks from upstream (#2134635)
 
 * Mon Feb 21 2022 Josef Ridky <jridky@redhat.com> - 1:5.8-25
 - fix segfault with error on subcontainer (#2051370)