...
On 6.4.2 after several snmpwalks to 1.3.6.1.4.1.9.9.748.1.1.1, there's a memory leak for mibd_infra which leads to a crash of the process Core for pid = 595820806 (mibd_infra) Core dump time: Sat Feb 23, 2019: 12:35:07 Process thread:2 received signal: 31 - Unknown signal. Sender pid:595820806 Signal specific information: Signal code 0 - Unknown signal Core for process at disk1a:/dumper/mibd_infra_342.by.mibd_infra.20190223-123507.node0_RSP0_CPU0.x86.Z Stack Trace #0 0xb53b6ef #1 0xb4a8dd0 #2 0xb4aa295 #3 0xb7ab26a Lap repro with a script: Tue May 21 14:08:09.674 EDT Successfully stored memory snapshot /harddisk:/malloc_dump/memcmp_start.out Tue May 21 14:08:31.517 EDT JID Text(KB) Data(KB) Stack(KB) Dynamic(KB) Process ------ ---------- ---------- ---------- ----------- ------- 339 8192 12288 131072 4132864 mibd_infra Tue May 21 17:11:42.265 EDT Successfully stored memory snapshot /harddisk:/malloc_dump/memcmp_end.out Tue May 21 17:11:55.697 EDT JID Text(KB) Data(KB) Stack(KB) Dynamic(KB) Process ------ ---------- ---------- ---------- ----------- ------- 339 8192 12288 131072 7147520 mibd_infra Tue May 21 17:11:56.619 EDT JID name mem before mem after difference mallocs restart/exit/new --- ---- ---------- --------- ---------- ------- ---------------- 339 mibd_infra 3010256 5411504 2401248 100052 340 mibd_interface 3798640 3798608 -32 0 341 mibd_route 1569732 1479820 -89912 -2926 338 mibd_entity 1695532 1497792 -197740 -6 Memory is not going back to normal
Polling to 1.3.6.1.4.1.9.9.748.1.1.1 on 6.4.2
Exclude OID with a view: snmp-server view 1 included snmp-server view 1.3.6.1.4.1.9.9.748.1.1.1 excluded snmp-server community view
None *PSIRT Evaluation:* The Cisco PSIRT has assigned this bug the following CVSS version 3 score. The Base CVSS score as of the time of evaluation is 0.0: https://tools.cisco.com/security/center/cvssCalculator.x?vector=CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N No CVE ID has been assigned to this issue. Additional information on Cisco''s security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html