Summary: | net-analyzer/net-snmp <5.4.1-r4 Perl Module "__snprint_value()" Buffer Overflow (CVE-2008-2292) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Robert Buchholz (RETIRED) <rbu> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | netmon |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://secunia.com/advisories/30187/ | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 225105 | ||
Bug Blocks: |
Description
Robert Buchholz (RETIRED)
2008-05-15 14:48:40 UTC
Thank you Robert for report. This is fixed in net-snmp-5.4.1-r4. But please, don't stabilize it now as we have one more security issue pending and I'd like to stabilize them in one go. A later version including the same patch has been stabled in bug 225105. GLSA 200808-02 |