[nsp] recent SNMP vulnerability vs 12.1(13)E14

Clayton Kossmeyer ckossmey at cisco.com
Fri Apr 23 11:23:46 EDT 2004


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


It's important to note that CSCed68575 was written in response to
problems caused by CSCeb22276.

Releases that don't have CSCeb22276 integrated (12.1(13)Ex, for
example) don't need CSCed68575.

Bug Toolkit doesn't really handle displaying regression information
very well.

A recently published revision (1.3) of the advisory calls out all
affected releases in the Affected Products section.

http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml

Hopefully this helps clear up some of the confusion.

Regards,

Clay

On Fri, Apr 23, 2004 at 04:29:14PM +0200, Kinczli Zolt?n wrote:
> hello,
> 
>   and the most important Q is:
> 
> if there are some maintenance releases of a train, for instance 12.1(13)E, 12.1(14)E, 12.1(19)E and 12.1(20)E,
> - and each has several rebuilds, E1, E2, E3, and so on...
> - and there is a bug, which get first integrated, say in April into 12.1(19.x)E interim,
> will it be intergrated, say in June into later rebuilds of less numbered (e.g. y<19) maintenence release.
> 
> see my point?
> 
> 
> April		12.1(19.x)E gets the fix, as the bugnav tells us, it's the 'first fixed-in' version
> 		at this time, say 12.1(13)E13 is alreay available
>   time passes
> May		12.1(20)E comes out, and of course it gets the fix
>   time passes
> June		12.1(13)E14 comes out... Q: will it receive the fix?
> 
>   what's tha main logic behind?
> 
> rgds
>  --zoltan
> 
> -----Original Message-----
> From: Gert Doering [mailto:gert at greenie.muc.de]
> Sent: Friday, April 23, 2004 3:57 PM
> To: Jay Young
> Cc: cisco-nsp at puck.nether.net
> Subject: Re: [nsp] recent SNMP vulnerability vs 12.1(13)E14
> 
> 
> Hi,
> 
> On Fri, Apr 23, 2004 at 09:45:42AM -0400, Jay Young wrote:
> > Along a similar line what about 12.2.18S3 the advisory says that 12.2S 
> > is vulnerable and the fix is 12.2.20S2 or 12.2.22S. Neither of which is 
> > available for a 7200.
> 
> As far as I understand it, the bug was introduced *after* 12.2(18)S, so 18S 
> is not-yet-vulnerable.
> 
> gert
> -- 
> USENET is *not* the non-clickable part of WWW!
>                                                            //www.muc.de/~gert/
> Gert Doering - Munich, Germany                             gert at greenie.muc.de
> fax: +49-89-35655025                        gert at net.informatik.tu-muenchen.de
> _______________________________________________
> cisco-nsp mailing list  cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
> 
> _______________________________________________
> cisco-nsp mailing list  cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (SunOS)

iD8DBQFAiTTrEHa/Ybuq8nARAmoOAJ41cUGVQbbZECKUICjIcriJxVLbvgCdEVAR
HTKbfPr8LcNJ/WDZ/s4SDdQ=
=GZAo
-----END PGP SIGNATURE-----


More information about the cisco-nsp mailing list