Bug 971041 - snmptrapd crash "buffer overflow detected" at fortify_fail.c
snmptrapd crash "buffer overflow detected" at fortify_fail.c
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: net-snmp (Show other bugs)
x86_64 Linux
urgent Severity high
: rc
: ---
Assigned To: Jan Safranek
Dalibor Pospíšil
: ZStream
Depends On: 953926
  Show dependency treegraph
Reported: 2013-06-05 10:10 EDT by Jan Kurik
Modified: 2013-06-25 10:29 EDT (History)
6 users (show)

See Also:
Fixed In Version: net-snmp-5.5-44.el6_4.2
Doc Type: Bug Fix
Doc Text:
Cause: Net-SNMP did not check that incoming SNMP messages are encoded properly and may have read past the receiving buffer size when parsing a message with invalid size of integer filed in the message. Consequence: snmptrapd, the SNMP trap processing daemon, crashed on incoming malformed message. Fix: We enhanced the checks of incoming messages. Result: snmptrapd no longer crashes when parsing incoming message with invalid integer sizes.
Story Points: ---
Clone Of:
Last Closed: 2013-06-25 10:29:43 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2013:0978 normal SHIPPED_LIVE net-snmp bug fix update 2013-06-25 14:28:13 EDT

  None (edit)
Description Jan Kurik 2013-06-05 10:10:37 EDT
This bug has been copied from bug #953926 and has been proposed
to be backported to 6.4 z-stream (EUS).
Comment 10 errata-xmlrpc 2013-06-25 10:29:43 EDT
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.


Note You need to log in before you can comment on or make changes to this bug.