- Issued:
- 2010-11-15
- Updated:
- 2010-11-15
RHBA-2010:0884 - Bug Fix Advisory
Synopsis
net-snmp bug fix update
Type/Severity
Bug Fix Advisory
Topic
Updated net-snmp packages that fix a bug are now available for Red Hat
Enterprise Linux 5.
Description
The net-snmp packages provide various libraries and tools for the Simple Network
Management Protocol (SNMP), including an SNMP library, an extensible agent,
tools for requesting or setting information from SNMP agents, tools for
generating and handling SNMP traps, a version of the netstat command which uses
SNMP, and a Tk/Perl MIB browser.
This update fixes the following bug:
- When retrieving data for the Remote Network Monitoring Management Information
Base (RMON-MIB), the snmpd daemon may have leaked file descriptors. As a result,
the file descriptors available to the snmpd process may have been exhausted,
rendering the daemon unable to respond to SNMP requests. With this update, all
unnecessary file descriptors are appropriately closed, and snmpd now works as
expected. (BZ#651807)
All users of net-snmp are advised to upgrade to these updated packages, which
resolve this issue.
Solution
Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 ia64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 i386
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.4 s390x
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.4 ppc
Fixes
- BZ - 651807 - Leak of FD in rmon-mib
CVEs
(none)
References
(none)
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.