Skip to content

Conversation

evrenonur
Copy link

This change introduces a validation step in the netsnmp_session_set_sec_level function to ensure that the SNMP session is properly initialized before attempting to set the security level. If the session is not initialized, a zend_value_error is triggered, improving error handling and preventing potential crashes.

Fixes: #17330

…evel setter

This change introduces a validation step in the `netsnmp_session_set_sec_level` function to ensure that the SNMP session is properly initialized before attempting to set the security level. If the session is not initialized, a zend_value_error is triggered, improving error handling and preventing potential crashes.
@devnexen
Copy link
Member

devnexen commented Jan 3, 2025

Thanks but I had a slightly different approach in mind, will commit soon-ish :)

@devnexen
Copy link
Member

devnexen commented Jan 8, 2025

Hi @evrenonur and thanks for your effort however a fix had been pushed since.

@devnexen devnexen closed this Jan 8, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

snmp SEGV

2 participants