Hello,

Attached is a patch to fix a segfault that I was experiencing on x86_64 Linux host running net-snmp 5.3.0.

The issue is that incorrect types are passed to netsnmp_hex_to_binary which are cast unsafely causing a buffer overflow. I think the patch is trivially correct, but if you want more details, please let me know.

Cheers,
scott.
--- agent/mibgroup/tcp-mib/data_access/tcpConn_linux.c  10 Dec 2005 16:35:37 
-0000      1.5
+++ agent/mibgroup/tcp-mib/data_access/tcpConn_linux.c  16 Aug 2006 18:29:50 
-0000
@@ -248,8 +248,8 @@ _load6(netsnmp_container *container, u_i
      */
     while (fgets(line, sizeof(line), in)) {
         netsnmp_tcpconn_entry *entry;
-        int             state, rc, local_port, remote_port, buf_len, offset,
-                        tmp_state;
+        int             state, rc, local_port, remote_port, tmp_state;
+        size_t          buf_len, offset;
         u_char          local_addr[48], remote_addr[48];
         u_char         *tmp_ptr;
 
-------------------------------------------------------------------------
Using Tomcat but need to do more? Need to support web services, security?
Get stuff done quickly with pre-integrated technology to make your job easier
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
_______________________________________________
Net-snmp-coders mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/net-snmp-coders

Reply via email to