5.7.2 will crash if a running process has arguments that are longer than BUFSIZ. An easy way to recreate this is to create a shell script with:
in it and then call it with:
./test.sh a really long string here
Then, run snmpwalk against the host. snmpd will crash.
In agent/mibgroup/host/data_access/swrun_kinfo.c, we use strcat() and will overflow the buffer (buf) if argv is larger than BUFSIZ bytes.
The attached patch will truncate anything beyond BUFSIZ and prevent snmpd from crashing.