http://www.ubuntu.com/usn/usn-685-1
** Changed in: net-snmp (Ubuntu)
Assignee: (unassigned) = Kees Cook (kees)
Status: Incomplete = Fix Released
--
[CVE-2008-2292] Buffer overflow in __snprint_value() in snmp_get
https://bugs.launchpad.net/bugs/241892
You received this bug
Thanks for the patch! Can you please detail the testing you've done (eg
build, test suite, PoC, QA regression, and/or testing the patched code
path for no regressions)? I am going to mark the bug Incomplete for now,
please mark back to 'In Progress' when ready. Thanks again!
** Changed in:
Attaching debdiff
** Attachment added: net-snmp_5.4.1~dfsg-4ubuntu4.1.debdiff
http://launchpadlibrarian.net/17734032/net-snmp_5.4.1%7Edfsg-4ubuntu4.1.debdiff
--
[CVE-2008-2292] Buffer overflow in __snprint_value() in snmp_get
https://bugs.launchpad.net/bugs/241892
You received this bug
Updating patch.
** Attachment added: net-snmp_5.4.1~dfsg-4ubuntu4.1.debdiff
http://launchpadlibrarian.net/17735005/net-snmp_5.4.1%7Edfsg-4ubuntu4.1.debdiff
--
[CVE-2008-2292] Buffer overflow in __snprint_value() in snmp_get
https://bugs.launchpad.net/bugs/241892
You received this bug
** Changed in: net-snmp (Ubuntu)
Status: New = Confirmed
--
[CVE-2008-2292] Buffer overflow in __snprint_value() in snmp_get
https://bugs.launchpad.net/bugs/241892
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to net-snmp in ubuntu.
** Changed in: net-snmp (Ubuntu)
Status: Confirmed = In Progress
--
[CVE-2008-2292] Buffer overflow in __snprint_value() in snmp_get
https://bugs.launchpad.net/bugs/241892
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to net-snmp in