> On Sat, 1 Nov 2008 20:47:38 +1100, Steffen Joeris <[EMAIL PROTECTED]>
> said:
SJ> In Debian stable, we are shipping version 5.2.3 and I was wondering,
SJ> if it is vulnerable as well.
Yes, it is vulnerable. Note that we released a 5.2.5.1 as well to
update that line of code. Any chan
Hi
(Please CC me on replies, since I am not subscribed)
I just saw the announcement[0] about the potential DoS attack and had a look
through the patches. In Debian stable, we are shipping version 5.2.3 and I
was wondering, if it is vulnerable as well. It seems that the vulnerable code
is not pr
Hi Wes
Thanks for clarifying.
On Tue, 4 Nov 2008 01:49:06 am Wes Hardaker wrote:
> > On Sat, 1 Nov 2008 20:47:38 +1100, Steffen Joeris
> > <[EMAIL PROTECTED]> said:
>
> SJ> In Debian stable, we are shipping version 5.2.3 and I was wondering,
> SJ> if it is vulnerable as well.
>
> Yes, it i
> On Tue, 4 Nov 2008 02:02:54 +1100, Steffen Joeris <[EMAIL PROTECTED]>
> said:
SJ> This version of net-snmp was released with etch (our stable version) and
SJ> unfortunately it is not possible to increase the upstream version there.
BTW, our packaging policy is that changes to the Z in
> On Tue, 4 Nov 2008 02:02:54 +1100, Steffen Joeris <[EMAIL PROTECTED]>
> said:
SJ> Is there any chance you can provide a backported fix? It would be
SJ> much appreciated and I won't have time to look into it until
SJ> Thursday :(
Someone needs to make similar changes to the old code...
Hi,
Is there any issue in the net-snmp 5.2.1 that would cause the
polling of interface bandwidth to fail or for the interface to fail to
be returned in the list of valid interfaces? I seem to be having an
issue with interfaces on freebsd 4.11 with net-snmp 5.2.1 where ppp
interfaces fail to po