Hi, I think you can fix this bug by applying this patch: --- python/netsnmp/client_intf.c +++ python/netsnmp/client_intf.c 320c320 < snprintf(buf,"%ld", buf_len, *var->val.integer); --- > snprintf(buf, buf_len, "%ld", *var->val.integer);
The bug has been introduced in the SVN 16962 and it's applied in the patch: debian/patches/49_cve2008_2292_python.patch It's a simple type that cause every walk on integer MIBs to cause a segfault from python. I've verified it is present in the latest experimental package (5.4.1~dfsg-9) and in the SVN Trunk of net-snmp (actually 17206). Regards, Gabriele Messineo -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]