No. I have not. The installation is different. 

Actually, I ran both 5.0.10.2 and my patched 5.0.9 on the standard
linux. Neither has the leak (that part of code doesn't get exercised, I
guess.)
As you mentioned before, this part of code is rarely got run into.


-----Original Message-----
From: Robert Story [mailto:[EMAIL PROTECTED] 
Sent: Thursday, November 17, 2005 2:48 PM
To: Fong Tsui
Cc: [email protected]; Wes Hardaker; Dave Shield
Subject: Re: snmpd memory grows on invalid udp requests --- security????

On Thu, 17 Nov 2005 14:28:17 -0800 Fong wrote:
FT> I didn't reproduce leak on 5.0.10.2 on standard linux system with
the
FT> same testcase, only saw it on my system which is based on linux but
not
FT> standard.

Just to clarify - did you try 5.0.10.2 on your system, or just your
patched
5.0.9?

-- 
NOTE: messages sent directly to me, instead of the lists, will be
deleted
      unless they are requests for paid consulting services.

Robert Story; NET-SNMP Junkie
Support: <http://www.net-snmp.org/> <irc://irc.freenode.net/#net-snmp>
Archive:
<http://sourceforge.net/mailarchive/forum.php?forum=net-snmp-coders>

You are lost in a twisty maze of little standards, all different. 


-------------------------------------------------------
This SF.Net email is sponsored by the JBoss Inc.  Get Certified Today
Register for a JBoss Training Course.  Free Certification Exam
for All Training Attendees Through End of 2005. For more info visit:
http://ads.osdn.com/?ad_idv28&alloc_id845&op=click
_______________________________________________
Net-snmp-coders mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/net-snmp-coders

Reply via email to