Bug ID 761981: information in snmpd.conf files may be overwritten

Last Modified: May 14, 2019

Bug Tracker

Affected Product:  See more info
BIG-IP TMOS(all modules)

Known Affected Versions:
12.1.0, 12.1.0 HF1, 12.1.0 HF2, 12.1.1, 12.1.1 HF1, 12.1.1 HF2, 12.1.2, 12.1.2 HF1, 12.1.2 HF2, 12.1.3, 12.1.3.1, 12.1.3.2, 12.1.3.3, 12.1.3.4, 12.1.3.5, 12.1.3.6, 12.1.3.7, 12.1.4, 12.1.4.1

Opened: Mar 19, 2019
Severity: 4-Minor

Symptoms

During daemon startup, the snmpd daemon zeroes out sensitive data in the snmpd.conf files. This is done so that passwords are not available to be read on disk. This can cause problems when other daemons using the net-snmp shared libraries access snmpd.conf files for data that they need during startup.

Impact

Daemons usually start in an orderly fashion and usually do not conflict with each other. However, it is possible that they could fail to load correctly due to the zeroing out of data.

Conditions

Depending upon the startup sequence, a daemon may need data from snmpd.conf files.

Workaround

Use tmsh to configure SNMP users.

Fix Information

None

Behavior Change