<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en" xmlns="http://www.w3.org/2005/Atom"><title>Recent changes to official-patches</title><link href="https://sourceforge.net/p/net-snmp/official-patches/" rel="alternate"/><link href="https://sourceforge.net/p/net-snmp/official-patches/feed.atom" rel="self"/><id>https://sourceforge.net/p/net-snmp/official-patches/</id><updated>2021-07-08T10:59:45.168000Z</updated><subtitle>Recent changes to official-patches</subtitle><entry><title>SNMP 5.9.1 snmpwalk crashes, looking for bb file as well</title><link href="https://sourceforge.net/p/net-snmp/official-patches/49/" rel="alternate"/><published>2021-07-08T10:59:45.168000Z</published><updated>2021-07-08T10:59:45.168000Z</updated><author><name>Sriparna Som</name><uri>https://sourceforge.net/u/sriparna/</uri></author><id>https://sourceforge.net124dc9de2aeab851a7c0e85fb2efb5a94b7fe9f6</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;I have taken net-snmp 5.9.1 tar ball and replaced my 5.7.3 net-snmp version(upgraded).&lt;br/&gt;
I see one issue :&lt;br/&gt;
when i do snmpwalk:&lt;br/&gt;
snmpwalk -v 1 -c public localhost/127.0.0.1  it gives timeout and core.&lt;/p&gt;
&lt;p&gt;.1.3.6.1.2.1.6.15.0 = Counter32: 1502&lt;br/&gt;
Timeout: No Response from 127.0.0.1&lt;/p&gt;
&lt;p&gt;Do we have any known issue in 5.9.1 latest? do i miss something?&lt;br/&gt;
I tried to fetch 5.9.1 bb file as well from git but could not find. my delivery is blocked due to these issues.&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>#48 Official patch for CVE-2014-3565</title><link href="https://sourceforge.net/p/net-snmp/official-patches/48/?limit=25#a8ef" rel="alternate"/><published>2014-08-29T11:27:02.108000Z</published><updated>2014-08-29T11:27:02.108000Z</updated><author><name>Jan Safranek</name><uri>https://sourceforge.net/u/jsafranek/</uri></author><id>https://sourceforge.nete8f6fe79246e61f2374120ba6c6ca991e0916e63</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;This patch has been pushed to 5.4, 5.5, 5.6 and 5.7 branches and it will be part of following Net-SNMP releases.&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>Official patch for CVE-2014-3565</title><link href="https://sourceforge.net/p/net-snmp/official-patches/48/" rel="alternate"/><published>2014-08-29T11:26:10.782000Z</published><updated>2014-08-29T11:26:10.782000Z</updated><author><name>Jan Safranek</name><uri>https://sourceforge.net/u/jsafranek/</uri></author><id>https://sourceforge.net8b2e549439eb6a5baeb508d966b8de9bcad64210</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Remote denial-of-service flaw was found in the way snmptrapd handled certain SNMP traps when started with the "-OQ" option. If an attacker sent an SNMP trap containing variable with a NULL type where an integer variable type was expected, it would cause snmptrapd to crash.&lt;/p&gt;
&lt;p&gt;Affected Net-SNMP versions:&lt;br /&gt;
Net-SNMP 5.7.0 - 5.7.2.1&lt;br /&gt;
Net-SNMP 5.6.0 - 5.6.2.1&lt;br /&gt;
Net-SNMP 5.5.0 - 5.5.2.1&lt;br /&gt;
Net-SNMP 5.4.0 - 5.4.4&lt;/p&gt;
&lt;p&gt;(unsupported releases older than 5.4 were not evaluated)&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>#47 Let extend directive specify cache-timeout and exec-type</title><link href="https://sourceforge.net/p/net-snmp/official-patches/47/?limit=25#da68" rel="alternate"/><published>2014-08-09T14:44:54.469000Z</published><updated>2014-08-09T14:44:54.469000Z</updated><author><name>Niels Baggesen</name><uri>https://sourceforge.net/u/nba/</uri></author><id>https://sourceforge.netff41ea0d27abb5829c1653a2216ca701d18bbe34</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Ticket moved from /p/net-snmp/bugs/2563/&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>5.3.2: Fixes VU#878044 and CVE-2008-0960</title><link href="https://sourceforge.net/p/net-snmp/official-patches/46/" rel="alternate"/><published>2008-06-09T18:39:34Z</published><updated>2008-06-09T18:39:34Z</updated><author><name>Wes Hardaker</name><uri>https://sourceforge.net/u/hardaker/</uri></author><id>https://sourceforge.netad94d00d78484a5dcfbbccd163843dddab368ddd</id><summary type="html">This patch fixes the bug found in the Net-SNMP and UCD-SNMP distributions that is identified by VU\#878044 and CVE-2008-0960.</summary></entry><entry><title>5.4.1 suppress annoying registration warnings on startup</title><link href="https://sourceforge.net/p/net-snmp/official-patches/45/" rel="alternate"/><published>2007-10-01T22:07:07Z</published><updated>2007-10-01T22:07:07Z</updated><author><name>Thomas Anders</name><uri>https://sourceforge.net/u/tanders/</uri></author><id>https://sourceforge.net06aa8c1490c01a4e8abbd83e991069a1e9dd2a18</id><summary type="html">The attached patch fixes the following annoying warnings

netsnmp\_assert \!"registration \!= duplicate" failed agent\_registry.c:535 netsnmp\_subtree\_load\(\)
netsnmp\_assert \!"registration \!= duplicate" failed agent\_registry.c:535 netsnmp\_subtree\_load\(\)
netsnmp\_assert \!"registration \!= duplicate" failed agent\_registry.c:535 netsnmp\_subtree\_load\(\)

logged by the agent on startup for everyone.

This is the same patch as SVN Rev. 16669.</summary></entry><entry><title>5.4: memory leak in UDP transport code</title><link href="https://sourceforge.net/p/net-snmp/official-patches/44/" rel="alternate"/><published>2006-12-16T10:02:50Z</published><updated>2006-12-16T10:02:50Z</updated><author><name>Magnus Fromreide</name><uri>https://sourceforge.net/u/magfr/</uri></author><id>https://sourceforge.netb93e1c6291d62b65223461333c97aae6f77eff51</id><summary type="html">snmp\_udp\_transport leaks memory - the addr\_pair is never deallocated and never leaves the function so I changed it to be a local variable.

The attached patch corrects this and makes a small adjustment to a debug printout as well.</summary></entry><entry><title>5.4 : tcp connection table leaks fds</title><link href="https://sourceforge.net/p/net-snmp/official-patches/43/" rel="alternate"/><published>2006-12-08T13:55:28Z</published><updated>2006-12-08T13:55:28Z</updated><author><name>Anonymous</name><uri>https://sourceforge.net/u/userid-None/</uri></author><id>https://sourceforge.netc59537bdc8a22b90997c41a886626230a765d48d</id><summary type="html">When compiling with IPv6 enabled the tcp connection table seems to leak file descriptors. It seems like the same file is being opened twice \(probably due to copy-paste?\), the attached patch fixes this.

</summary></entry><entry><title>5.3.1 : memory leaks in ipAddress and CidrRoute tables</title><link href="https://sourceforge.net/p/net-snmp/official-patches/42/" rel="alternate"/><published>2006-12-06T15:22:39Z</published><updated>2006-12-06T15:22:39Z</updated><author><name>Robert Story</name><uri>https://sourceforge.net/u/rstory/</uri></author><id>https://sourceforge.net28535fda2f338aede93fb26eb00bba05e18fff0d</id><summary type="html">The ipAddressTable, ipCidrRouteTable and inetCidrRouteTable tables had memory leaks that rapidly consumed memory on some systems \(especially ones with vlans, ppp and ppoe\). This patch reduces the leak.</summary></entry><entry><title>5.4 : memory leaks in ipAddress and CidrRoute tables</title><link href="https://sourceforge.net/p/net-snmp/official-patches/41/" rel="alternate"/><published>2006-12-06T15:19:45Z</published><updated>2006-12-06T15:19:45Z</updated><author><name>Robert Story</name><uri>https://sourceforge.net/u/rstory/</uri></author><id>https://sourceforge.neted55fc4d5a3232a1aaf6f680876fcaf0696342ed</id><summary type="html">The ipAddressTable, ipCidrRouteTable and inetCidrRouteTable tables had memory leaks that rapidly consumed memory on some systems \(especially ones with vlans, ppp and ppoe\). This patch reduces the leak.</summary></entry></feed>