Este contenido no está disponible en el idioma seleccionado.
7.154. net-snmp
Updated net-snmp packages that fix several bugs are now available for Red Hat Enterprise Linux 6.
The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the
netstat
utility which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.
Bug Fixes
- BZ#829271
- Previously, there was a limit of 50
exec
entries in the/etc/snmp/snmpd.conf
congiguration file. With more than 50 such entries in the file, thesnmpd
daemon reported the following error message:Error: No further UCD-compatible entries
With this update, the fixed limit has been removed, and there can now be any number ofexec
entries in/etc/snmp/snmpd.conf
. - BZ#848319
- Prior to this update, the
libnetsnmpmibs.so.20
andlibnetsnmphelpers.so.20
libraries did not contain an RPATH entry to the libperl.so package for embedding Perl. This could cause problems when linking custom SNMP applications or modules. An upstream patch, which adds RPATH for the Perl libraries, has been provided, and all libperl.so references are now resolved. - BZ#800671
- Previously, the
snmpd
daemon ignored thetrapsess -e <engineID>
configuration option in the/etc/snmp/snmpd.conf
file and sent a default engineID string even iftrapsess
was configured with an explicit engineID value. An upstream patch has been provided to fix this bug andsnmpd
now sends outgoing traps with an engineID string as specified in/etc/snmp/snmpd.conf
. - BZ#846436
- Due to a possible race condition, the
snmpd
daemon could fail to count some processes when filling in theUCD-SNMP-MIB::prTable
table. With this update, the underlying source code has been adapted to prevent such a race condition, so that all processes are now counted as expected. - BZ#833013
- Prior to this update, the
snmpd
daemon ignored the port number of theclientaddr
option when specifying the source address of outgoing SNMP requests. As a consequence, the system assigned a random port number to theudp
socket. This update introduces a new configuration optionclientaddrUsesPort
, which, if set toyes
, allows to specify both the port number and the source IP address in theclientaddr
option. Now, administrators can increase security with firewall rules and SELinux policies by configuring a specific source port of outgoing traps and other requests. - BZ#851637
- When the
snmpd
daemon was shutting down during processing of internal queries, a request was neither marked as failed nor finished, andsnmpd
waited indefinitely for the request to be processed. With this update,snmpd
marks all internal queries as failed during shutdown. - BZ#842279
- Previously, implementation of the
UCD-SNMP-MIB::extCommand
variable in thesnmpd
daemon reported only names of the executable parameters, missing all other command line parameters. With this update,UCD-SNMP-MIB::extCommand
has been fixed andsnmpd
returns the full command line output. - BZ#784502
- Previously,
snmptrapd(8)
manual page did not properly describe how to load multiple configuration files using the-c
option. With this update, the manual page has been fixed and describes that multiple configuration files must be separated by the comma character. - BZ#846532, BZ#861152
- In the previous net-snmp update, implementation of the
HOST-RESOURCES-MIB::hrStorageTable
table was rewritten and devices with CentraVision File System (CVFS) and OpenVZ container file systems (simfs
) were not reported. With this update, thesnmpd
daemon properly recognizesCVFS
andsimfs
devices and reports them inHOST-RESOURCES-MIB::hrStorageTable
. - BZ#846906
- When the
snmpd
daemon was not able to expand 32-bit counter provided by the operating system to 64-bits, as required by SNMP standards, thesnmpd
daemon occasionally reported the following error messages:c64 32 bit check failed
Error expanding XXX to 64bits
looks like a 64bit wrap, but prev!=new
These messages were in fact harmless but confusing. This update suppresses them and they are no longer returned in the described scenario. - BZ#845157
- The
snmpd
daemon reported an error message to system log files when it could not open the following files:/proc/net/if_inet6
,/proc/net/snmp6
,/proc/net/ipv6_route
,/proc/net/tcp6
, and/proc/net/udp6
. These files are typically missing on machines with disabled IPv6 networking, and thus reporting such error messages for them is meaningless. With this update, the error messages are suppressed, and the system log files are not filled with redundant messages. - BZ#848155
- Prior to this update, the
net-snmp
utility failed to read thediskIOLA1
,diskIOLA5
, anddiskIOLA15
object variables of the UCD-DISKIO-MIB object, as these variables were not implemented on the Linux operating system. Consequently, thesnmptable
utility failed to return values of the three variables correctly. With this update, these objects are implemented and their values are now displayed in theUCD-DISKIO-MIB::diskIOTable
table as expected. - BZ#825889
- Previously, the
snmpd
daemon was updated to send an SNMP response to broadcast requests from the same interface, on which a SNMP response had been received. However, this update also introduced a bug which preventedsnmpd
from sending responses to unicast request on multihomed machines. This update fixes this bug, so thesnmpd
daemon is now able to both answer unicast requests on multihomed machines and send responses to broadcast requests from the same interface, on which the request has been received. - BZ#824402
- Previously, the
snmptrapd
daemon terminated the embedded Perl interpreter immediately after theTERM
signal was received, regardless of whether embedded Perl code was still being used. Consequently,snmptrapd
could rarely terminate unexpectedly during shutdown. With this update, the embedded Perl interpreter is destroyed later during thesnmptrapd
shutdown, when all Perl processing is finished.
Users of net-snmp are advised to upgrade to these updated packages, which fix these bugs.