Hi,
I think you can fix this bug by applying this patch:

--- python/netsnmp/client_intf.c
+++ python/netsnmp/client_intf.c
320c320
<               snprintf(buf,"%ld", buf_len, *var->val.integer);
---
>               snprintf(buf, buf_len, "%ld", *var->val.integer);

The bug has been introduced in the SVN 16962 and it's applied in the patch:
debian/patches/49_cve2008_2292_python.patch

It's a simple type that cause every walk on integer MIBs to cause a segfault 
from python.

I've verified it is present in the latest experimental package (5.4.1~dfsg-9) 
and in the SVN Trunk of net-snmp (actually 17206).

Regards,

Gabriele Messineo



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to