[Pkg-net-snmp-devel] Bug#482333: marked as done (net-snmp: CVE-2008-2292 buffer overflow in __snprint_value function)

Debian Bug Tracking System owner at bugs.debian.org
Sat May 24 14:21:06 UTC 2008


Your message dated Sat, 24 May 2008 14:02:06 +0000
with message-id <E1JzuJy-0003iD-CR at ries.debian.org>
and subject line Bug#482333: fixed in net-snmp 5.4.1~dfsg-7.1
has caused the Debian Bug report #482333,
regarding net-snmp: CVE-2008-2292 buffer overflow in __snprint_value function
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner at bugs.debian.org
immediately.)


-- 
482333: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=482333
Debian Bug Tracking System
Contact owner at bugs.debian.org with problems
-------------- next part --------------
An embedded message was scrubbed...
From: Nico Golde <nion at debian.org>
Subject: net-snmp: CVE-2008-2292 buffer overflow in __snprint_value function
Date: Wed, 21 May 2008 23:43:13 +0200
Size: 3049
Url: http://lists.alioth.debian.org/pipermail/pkg-net-snmp-devel/attachments/20080524/076db552/attachment.eml 
-------------- next part --------------
An embedded message was scrubbed...
From: Nico Golde <nion at debian.org>
Subject: Bug#482333: fixed in net-snmp 5.4.1~dfsg-7.1
Date: Sat, 24 May 2008 14:02:06 +0000
Size: 7443
Url: http://lists.alioth.debian.org/pipermail/pkg-net-snmp-devel/attachments/20080524/076db552/attachment-0001.eml 


More information about the Pkg-net-snmp-devel mailing list