Hello,
Attached is a patch to fix a segfault that I was experiencing on x86_64
Linux host running net-snmp 5.3.0.
The issue is that incorrect types are passed to netsnmp_hex_to_binary
which are cast unsafely causing a buffer overflow. I think the patch is
trivially correct, but if you want more details, please let me know.
Cheers,
scott.
--- agent/mibgroup/tcp-mib/data_access/tcpConn_linux.c 10 Dec 2005 16:35:37
-0000 1.5
+++ agent/mibgroup/tcp-mib/data_access/tcpConn_linux.c 16 Aug 2006 18:29:50
-0000
@@ -248,8 +248,8 @@ _load6(netsnmp_container *container, u_i
*/
while (fgets(line, sizeof(line), in)) {
netsnmp_tcpconn_entry *entry;
- int state, rc, local_port, remote_port, buf_len, offset,
- tmp_state;
+ int state, rc, local_port, remote_port, tmp_state;
+ size_t buf_len, offset;
u_char local_addr[48], remote_addr[48];
u_char *tmp_ptr;
-------------------------------------------------------------------------
Using Tomcat but need to do more? Need to support web services, security?
Get stuff done quickly with pre-integrated technology to make your job easier
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
_______________________________________________
Net-snmp-coders mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/net-snmp-coders