-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Bug Fix Advisory Synopsis: Updated ucd-snmp packages available Advisory ID: RHBA-2002:159-01 Issue date: 2003-09-24 Updated on: 2003-09-24 Product: Red Hat Linux Keywords: ucd snmp memory report lm_sensors support Cross references: Obsoletes: - --------------------------------------------------------------------- 1. Topic: Updated ucd-snmp packages fix memory reporting problem and add dynamic lm_sensors support. 2. Relevant releases/architectures: Red Hat Linux 7.1 - i386 Red Hat Linux 7.2 - i386, ia64 Red Hat Linux 7.3 - i386 3. Problem description: SNMP (Simple Network Management Protocol) is a protocol used for network management. The UCD-SNMP project includes various SNMP tools: an extensible agent, an SNMP library, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl mib browser. These updated ucd-snmp packages fix a problem introduced in 4.2.5, which broke memory reporting. They also add support for dynamic lm_sensors reporting. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 67610 - snmpd does not provide memory information 69125 - lm_sensors support for ucd_snmp 6. RPMs required: Red Hat Linux 7.1: SRPMS: ftp://updates.redhat.com/7.1/en/os/SRPMS/ucd-snmp-4.2.5-8.71.1.src.rpm i386: ftp://updates.redhat.com/7.1/en/os/i386/ucd-snmp-4.2.5-8.71.1.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/ucd-snmp-devel-4.2.5-8.71.1.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/ucd-snmp-utils-4.2.5-8.71.1.i386.rpm Red Hat Linux 7.2: SRPMS: ftp://updates.redhat.com/7.2/en/os/SRPMS/ucd-snmp-4.2.5-8.72.1.src.rpm i386: ftp://updates.redhat.com/7.2/en/os/i386/ucd-snmp-4.2.5-8.72.1.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/ucd-snmp-devel-4.2.5-8.72.1.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/ucd-snmp-utils-4.2.5-8.72.1.i386.rpm ia64: ftp://updates.redhat.com/7.2/en/os/ia64/ucd-snmp-4.2.5-8.72.1.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/ucd-snmp-devel-4.2.5-8.72.1.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/ucd-snmp-utils-4.2.5-8.72.1.ia64.rpm Red Hat Linux 7.3: SRPMS: ftp://updates.redhat.com/7.3/en/os/SRPMS/ucd-snmp-4.2.5-8.73.1.src.rpm i386: ftp://updates.redhat.com/7.3/en/os/i386/ucd-snmp-4.2.5-8.73.1.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/ucd-snmp-devel-4.2.5-8.73.1.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/ucd-snmp-utils-4.2.5-8.73.1.i386.rpm 7. Verification: MD5 sum Package Name - -------------------------------------------------------------------------- 5a08c9b8ab6473642d0c5297c7f32f22 7.1/en/os/SRPMS/ucd-snmp-4.2.5-8.71.1.src.rpm d5b0ea1a45d5ad940346b551dd82d86f 7.1/en/os/i386/ucd-snmp-4.2.5-8.71.1.i386.rpm 41afb3d47cec84e9ca6b64c00a490216 7.1/en/os/i386/ucd-snmp-devel-4.2.5-8.71.1.i386.rpm e1757900b45e1b1fdbbf59739404f813 7.1/en/os/i386/ucd-snmp-utils-4.2.5-8.71.1.i386.rpm b0e82c6465137a6ab2950d20168ad700 7.2/en/os/SRPMS/ucd-snmp-4.2.5-8.72.1.src.rpm aec79f578b5feb3aaa2c4f1b71c726ed 7.2/en/os/i386/ucd-snmp-4.2.5-8.72.1.i386.rpm f106602ca9c7e58d189f88aac58777ea 7.2/en/os/i386/ucd-snmp-devel-4.2.5-8.72.1.i386.rpm 8938dbd7cbe9254cf03cc8f15084ea22 7.2/en/os/i386/ucd-snmp-utils-4.2.5-8.72.1.i386.rpm f5cf5a5408f15d599a0283736a723f3d 7.2/en/os/ia64/ucd-snmp-4.2.5-8.72.1.ia64.rpm 3554f4db2c2738a7544b05e53c018061 7.2/en/os/ia64/ucd-snmp-devel-4.2.5-8.72.1.ia64.rpm 05986ccaac43a623ff99872a6eda4133 7.2/en/os/ia64/ucd-snmp-utils-4.2.5-8.72.1.ia64.rpm 1fa795dbcd2096b7ea4c533945c87675 7.3/en/os/SRPMS/ucd-snmp-4.2.5-8.73.1.src.rpm 61a2b1a9f455ea3dab2cefd9de604cfd 7.3/en/os/i386/ucd-snmp-4.2.5-8.73.1.i386.rpm 02ebce340dc553b7783019c4468b7187 7.3/en/os/i386/ucd-snmp-devel-4.2.5-8.73.1.i386.rpm 70b6ada622b2ecdb3c9788ce1449b5a4 7.3/en/os/i386/ucd-snmp-utils-4.2.5-8.73.1.i386.rpm These packages are GPG signed by Red Hat for security. Our key is available from https://www.redhat.com/security/keys.html You can verify each package with the following command: rpm --checksig -v <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: md5sum <filename> 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/solutions/security/news/contact.html Copyright 2003 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQE/cgUjXlSAg2UNWIIRAho9AJ9XANGJ6wH1vWp0f0H5Q8nBEXvlPQCfecKu LhV8+tXflI9Foh+H2VUfcxk= =O2tK -----END PGP SIGNATURE----- _______________________________________________ Redhat-watch-list mailing list To unsubscribe, visit: https://www.redhat.com/mailman/listinfo/redhat-watch-list