I found the upstream bug for this issue:

https://github.com/net-snmp/net-snmp/issues/233

The fix landed in the upstream master and V5-9-patches branches [1], but
the issue is still open lacking verification. The patch doesn't apply
cleanly on version 5.8, the version currently in Focal, Groovy and
Hirsute, so this is not a SRU "patch on a plate" scenario, at least not
for the moment.

For Hirsute: I had a look at the past upstream release history and I
think it's unlikely that we'll get 5.9.1 released in time. However we do
have a patch ready for the version in Hirsute, so this should be an easy
fix. Before proceeding I'd wait for the upstream issue to be closed as
fixed, confirming that the patch works as expected. I poked the issue on
GitHub.

[1] https://github.com/net-snmp/net-
snmp/commit/bb30f8ee0075750fd3648a6bf3fab543f46152ed


** Changed in: net-snmp (Ubuntu)
       Status: New => Triaged

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1912389

Title:
   [Patch] SIGSEGV: crash when certificate contains extension longer
  than 512 bytes

To manage notifications about this bug go to:
https://bugs.launchpad.net/netsnmp/+bug/1912389/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to