No. I have not. The installation is different. Actually, I ran both 5.0.10.2 and my patched 5.0.9 on the standard linux. Neither has the leak (that part of code doesn't get exercised, I guess.) As you mentioned before, this part of code is rarely got run into.
-----Original Message----- From: Robert Story [mailto:[EMAIL PROTECTED] Sent: Thursday, November 17, 2005 2:48 PM To: Fong Tsui Cc: [email protected]; Wes Hardaker; Dave Shield Subject: Re: snmpd memory grows on invalid udp requests --- security???? On Thu, 17 Nov 2005 14:28:17 -0800 Fong wrote: FT> I didn't reproduce leak on 5.0.10.2 on standard linux system with the FT> same testcase, only saw it on my system which is based on linux but not FT> standard. Just to clarify - did you try 5.0.10.2 on your system, or just your patched 5.0.9? -- NOTE: messages sent directly to me, instead of the lists, will be deleted unless they are requests for paid consulting services. Robert Story; NET-SNMP Junkie Support: <http://www.net-snmp.org/> <irc://irc.freenode.net/#net-snmp> Archive: <http://sourceforge.net/mailarchive/forum.php?forum=net-snmp-coders> You are lost in a twisty maze of little standards, all different. ------------------------------------------------------- This SF.Net email is sponsored by the JBoss Inc. Get Certified Today Register for a JBoss Training Course. Free Certification Exam for All Training Attendees Through End of 2005. For more info visit: http://ads.osdn.com/?ad_idv28&alloc_id845&op=click _______________________________________________ Net-snmp-coders mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/net-snmp-coders
