7.154. net-snmp
7.154.1. RHBA-2013:0421 — net-snmp bug fix update リンクのコピーリンクがクリップボードにコピーされました!
リンクのコピーリンクがクリップボードにコピーされました!
Updated net-snmp packages that fix several bugs are now available for Red Hat Enterprise Linux 6.
The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the
netstat utility which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.
Bug Fixes
- BZ#829271
- Previously, there was a limit of 50
execentries in the/etc/snmp/snmpd.confcongiguration file. With more than 50 such entries in the file, thesnmpddaemon reported the following error message:With this update, the fixed limit has been removed, and there can now be any number ofError: No further UCD-compatible entries
Error: No further UCD-compatible entriesCopy to Clipboard Copied! Toggle word wrap Toggle overflow execentries in/etc/snmp/snmpd.conf. - BZ#848319
- Prior to this update, the
libnetsnmpmibs.so.20andlibnetsnmphelpers.so.20libraries did not contain an RPATH entry to the libperl.so package for embedding Perl. This could cause problems when linking custom SNMP applications or modules. An upstream patch, which adds RPATH for the Perl libraries, has been provided, and all libperl.so references are now resolved. - BZ#800671
- Previously, the
snmpddaemon ignored thetrapsess -e <engineID>configuration option in the/etc/snmp/snmpd.conffile and sent a default engineID string even iftrapsesswas configured with an explicit engineID value. An upstream patch has been provided to fix this bug andsnmpdnow sends outgoing traps with an engineID string as specified in/etc/snmp/snmpd.conf. - BZ#846436
- Due to a possible race condition, the
snmpddaemon could fail to count some processes when filling in theUCD-SNMP-MIB::prTabletable. With this update, the underlying source code has been adapted to prevent such a race condition, so that all processes are now counted as expected. - BZ#833013
- Prior to this update, the
snmpddaemon ignored the port number of theclientaddroption when specifying the source address of outgoing SNMP requests. As a consequence, the system assigned a random port number to theudpsocket. This update introduces a new configuration optionclientaddrUsesPort, which, if set toyes, allows to specify both the port number and the source IP address in theclientaddroption. Now, administrators can increase security with firewall rules and SELinux policies by configuring a specific source port of outgoing traps and other requests. - BZ#851637
- When the
snmpddaemon was shutting down during processing of internal queries, a request was neither marked as failed nor finished, andsnmpdwaited indefinitely for the request to be processed. With this update,snmpdmarks all internal queries as failed during shutdown. - BZ#842279
- Previously, implementation of the
UCD-SNMP-MIB::extCommandvariable in thesnmpddaemon reported only names of the executable parameters, missing all other command line parameters. With this update,UCD-SNMP-MIB::extCommandhas been fixed andsnmpdreturns the full command line output. - BZ#784502
- Previously,
snmptrapd(8)manual page did not properly describe how to load multiple configuration files using the-coption. With this update, the manual page has been fixed and describes that multiple configuration files must be separated by the comma character. - BZ#846532, BZ#861152
- In the previous net-snmp update, implementation of the
HOST-RESOURCES-MIB::hrStorageTabletable was rewritten and devices with CentraVision File System (CVFS) and OpenVZ container file systems (simfs) were not reported. With this update, thesnmpddaemon properly recognizesCVFSandsimfsdevices and reports them inHOST-RESOURCES-MIB::hrStorageTable. - BZ#846906
- When the
snmpddaemon was not able to expand 32-bit counter provided by the operating system to 64-bits, as required by SNMP standards, thesnmpddaemon occasionally reported the following error messages:c64 32 bit check failed
c64 32 bit check failedCopy to Clipboard Copied! Toggle word wrap Toggle overflow Error expanding XXX to 64bits
Error expanding XXX to 64bitsCopy to Clipboard Copied! Toggle word wrap Toggle overflow These messages were in fact harmless but confusing. This update suppresses them and they are no longer returned in the described scenario.looks like a 64bit wrap, but prev!=new
looks like a 64bit wrap, but prev!=newCopy to Clipboard Copied! Toggle word wrap Toggle overflow - BZ#845157
- The
snmpddaemon reported an error message to system log files when it could not open the following files:/proc/net/if_inet6,/proc/net/snmp6,/proc/net/ipv6_route,/proc/net/tcp6, and/proc/net/udp6. These files are typically missing on machines with disabled IPv6 networking, and thus reporting such error messages for them is meaningless. With this update, the error messages are suppressed, and the system log files are not filled with redundant messages. - BZ#848155
- Prior to this update, the
net-snmputility failed to read thediskIOLA1,diskIOLA5, anddiskIOLA15object variables of the UCD-DISKIO-MIB object, as these variables were not implemented on the Linux operating system. Consequently, thesnmptableutility failed to return values of the three variables correctly. With this update, these objects are implemented and their values are now displayed in theUCD-DISKIO-MIB::diskIOTabletable as expected. - BZ#825889
- Previously, the
snmpddaemon was updated to send an SNMP response to broadcast requests from the same interface, on which a SNMP response had been received. However, this update also introduced a bug which preventedsnmpdfrom sending responses to unicast request on multihomed machines. This update fixes this bug, so thesnmpddaemon is now able to both answer unicast requests on multihomed machines and send responses to broadcast requests from the same interface, on which the request has been received. - BZ#824402
- Previously, the
snmptrapddaemon terminated the embedded Perl interpreter immediately after theTERMsignal was received, regardless of whether embedded Perl code was still being used. Consequently,snmptrapdcould rarely terminate unexpectedly during shutdown. With this update, the embedded Perl interpreter is destroyed later during thesnmptrapdshutdown, when all Perl processing is finished.
Users of net-snmp are advised to upgrade to these updated packages, which fix these bugs.