news 28 Posted January 15, 2010 This is a multi-part message in MIME format... ------------=_1263571412-24326-3445 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Advisory MDVA-2010:027 http://www.mandriva.com/security/ _______________________________________________________________________ Package : net-snmp Date : January 15, 2010 Affected: 2009.0, Enterprise Server 5.0 _______________________________________________________________________ Problem Description: This is a minor bugfix release for net-snmp: The /etc/snmp/snmp.local.conf file contains a line that enable quickprinting features that breaks the output from snmpget for the nagios plugins using it. The packages provided with this update addresses this problem. _______________________________________________________________________ References: https://qa.mandriva.com/55952 _______________________________________________________________________ Updated Packages: Mandriva Linux 2009.0: e65564756dd67d454d8537254b86095b 2009.0/i586/libnet-snmp15-5.4.2-2.3mdv2009.0.i586.rpm 699a8dc79ede68479b7fe66fe72708db 2009.0/i586/libnet-snmp-devel-5.4.2-2.3mdv2009.0.i586.rpm be55eb254e3a9e793e1104aadf432110 2009.0/i586/libnet-snmp-static-devel-5.4.2-2.3mdv2009.0.i586.rpm e65dc3fad60fbf045f1ad6e67fd863e3 2009.0/i586/net-snmp-5.4.2-2.3mdv2009.0.i586.rpm 00a469e2ed241e623cf90e9e373bd3a0 2009.0/i586/net-snmp-mibs-5.4.2-2.3mdv2009.0.i586.rpm e7624ac192d04ed3f8117c1c993d5944 2009.0/i586/net-snmp-tkmib-5.4.2-2.3mdv2009.0.i586.rpm 238c163026bb9ff5cbfa776102337418 2009.0/i586/net-snmp-trapd-5.4.2-2.3mdv2009.0.i586.rpm b6350045187323079a62399587ea2235 2009.0/i586/net-snmp-utils-5.4.2-2.3mdv2009.0.i586.rpm 906f8da1df07b0f6a909f7233140aeac 2009.0/i586/perl-NetSNMP-5.4.2-2.3mdv2009.0.i586.rpm fb46714dbc5c8035b101b8a73fc1bcbc 2009.0/SRPMS/net-snmp-5.4.2-2.3mdv2009.0.src.rpm Mandriva Linux 2009.0/X86_64: e0bd5aed9182ef14f8baa6b6e192ff71 2009.0/x86_64/lib64net-snmp15-5.4.2-2.3mdv2009.0.x86_64.rpm 23267f2d508a2bb0489e50f7c87b93b9 2009.0/x86_64/lib64net-snmp-devel-5.4.2-2.3mdv2009.0.x86_64.rpm 6b331dd3f9a3510b448a376817b038cb 2009.0/x86_64/lib64net-snmp-static-devel-5.4.2-2.3mdv2009.0.x86_64.rpm ea91284c639a24d536c12eee69718b00 2009.0/x86_64/net-snmp-5.4.2-2.3mdv2009.0.x86_64.rpm c9c7be5e7eee3f346c1b681c6055b41a 2009.0/x86_64/net-snmp-mibs-5.4.2-2.3mdv2009.0.x86_64.rpm fc3b2466e6cdf042f4c6ee8d55eafe0a 2009.0/x86_64/net-snmp-tkmib-5.4.2-2.3mdv2009.0.x86_64.rpm f09a26f4a3a4a31d52c8f67f76488198 2009.0/x86_64/net-snmp-trapd-5.4.2-2.3mdv2009.0.x86_64.rpm b72ff22adff9ce602ab5599d6386cc46 2009.0/x86_64/net-snmp-utils-5.4.2-2.3mdv2009.0.x86_64.rpm f58c735a7f5779b9f00b6ac1c2eaafe3 2009.0/x86_64/perl-NetSNMP-5.4.2-2.3mdv2009.0.x86_64.rpm fb46714dbc5c8035b101b8a73fc1bcbc 2009.0/SRPMS/net-snmp-5.4.2-2.3mdv2009.0.src.rpm Mandriva Enterprise Server 5: 51e0669f72b863272cebcc3482afc906 mes5/i586/libnet-snmp15-5.4.2-2.3mdvmes5.i586.rpm b4ddff3f32f7348acfa15d97f8050074 mes5/i586/libnet-snmp-devel-5.4.2-2.3mdvmes5.i586.rpm af1a374ec339d778ba5b511f136c23a5 mes5/i586/libnet-snmp-static-devel-5.4.2-2.3mdvmes5.i586.rpm 3a03acef5a511a75afdcd71b0191d995 mes5/i586/net-snmp-5.4.2-2.3mdvmes5.i586.rpm 5498af80ca3483d204c5b6f94b151b9b mes5/i586/net-snmp-mibs-5.4.2-2.3mdvmes5.i586.rpm 0fc522931c6e1fd8c5199b251bc8e111 mes5/i586/net-snmp-tkmib-5.4.2-2.3mdvmes5.i586.rpm 1dc63786f05d3616950e18ca156995e1 mes5/i586/net-snmp-trapd-5.4.2-2.3mdvmes5.i586.rpm 6aab0bac70fb995a7b61fdf75cc99be3 mes5/i586/net-snmp-utils-5.4.2-2.3mdvmes5.i586.rpm 669e4777834c518c1ac4230ade01faaa mes5/i586/perl-NetSNMP-5.4.2-2.3mdvmes5.i586.rpm e8ac6975d4eca1a60e1da2f7bd19db6e mes5/SRPMS/net-snmp-5.4.2-2.3mdvmes5.src.rpm Mandriva Enterprise Server 5/X86_64: 28be2354dd2e1f07311e93d44a1e6d21 mes5/x86_64/lib64net-snmp15-5.4.2-2.3mdvmes5.x86_64.rpm f3e206bfe12514bdf16cf49468b15432 mes5/x86_64/lib64net-snmp-devel-5.4.2-2.3mdvmes5.x86_64.rpm 0bda96278c5ea87044db170e3e60c75f mes5/x86_64/lib64net-snmp-static-devel-5.4.2-2.3mdvmes5.x86_64.rpm 96088036e244e2166126518febc517e7 mes5/x86_64/net-snmp-5.4.2-2.3mdvmes5.x86_64.rpm bb6f52aefb9166003af5dd92c2c04f74 mes5/x86_64/net-snmp-mibs-5.4.2-2.3mdvmes5.x86_64.rpm eba57856261ae8a9a2a4416a359af913 mes5/x86_64/net-snmp-tkmib-5.4.2-2.3mdvmes5.x86_64.rpm ed58aa2d3c8a07718ca57472a66c639d mes5/x86_64/net-snmp-trapd-5.4.2-2.3mdvmes5.x86_64.rpm ca8948713819e0baf94dd954f0b4410d mes5/x86_64/net-snmp-utils-5.4.2-2.3mdvmes5.x86_64.rpm 1ba5a70fbf0809b9aa5abc1c2aed7964 mes5/x86_64/perl-NetSNMP-5.4.2-2.3mdvmes5.x86_64.rpm e8ac6975d4eca1a60e1da2f7bd19db6e mes5/SRPMS/net-snmp-5.4.2-2.3mdvmes5.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLUGT5mqjQ0CJFipgRAhvDAKCEPhloRo1rnCjwVq/rjsDzC+8m9ACgjNqP Ul8ckRYTEpxyrurQntH5Vsc= =6SBM -----END PGP SIGNATURE----- ------------=_1263571412-24326-3445 Content-Type: text/plain; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________ ------------=_1263571412-24326-3445-- Share this post Link to post