diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2022-07-21 18:13:18 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2022-07-22 13:30:29 +0200 |
commit | 7e930376320e016856285807d7788b01e51cc594 (patch) | |
tree | 42af5ffdc9af82005c3a34b0e42960ac8c6b50e5 | |
parent | 83e918a9794a98459b443e0095a9d13369d2fc7f (diff) | |
download | current-20220721181318_15.0.tar.gz |
Thu Jul 21 18:13:18 UTC 202220220721181318_15.0
patches/packages/net-snmp-5.9.3-x86_64-1_slack15.0.txz: Upgraded.
This update fixes security issues:
A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause
an out-of-bounds memory access.
A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL
pointer dereference.
Improper Input Validation when SETing malformed OIDs in master agent and
subagent simultaneously.
A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable
can cause an out-of-bounds memory access.
A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a
NULL pointer dereference.
A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer
dereference.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24807
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24810
(* Security fix *)
-rw-r--r-- | ChangeLog.rss | 36 | ||||
-rw-r--r-- | ChangeLog.txt | 24 | ||||
-rw-r--r-- | FILELIST.TXT | 145 | ||||
-rw-r--r-- | patches/packages/net-snmp-5.9.3-x86_64-1_slack15.0.txt | 11 | ||||
-rw-r--r-- | patches/source/net-snmp/doinst.sh | 24 | ||||
-rw-r--r-- | patches/source/net-snmp/net-snmp-5.7.2-cert-path.patch | 30 | ||||
-rw-r--r-- | patches/source/net-snmp/net-snmp-5.7.3-iterator-fix.patch | 14 | ||||
-rw-r--r-- | patches/source/net-snmp/net-snmp-5.8-Remove-U64-typedef.patch | 12 | ||||
-rw-r--r-- | patches/source/net-snmp/net-snmp-5.8-modern-rpm-api.patch | 83 | ||||
-rw-r--r-- | patches/source/net-snmp/net-snmp-5.8-multilib.patch | 45 | ||||
-rwxr-xr-x | patches/source/net-snmp/net-snmp.SlackBuild | 209 | ||||
-rw-r--r-- | patches/source/net-snmp/net-snmp.url | 1 | ||||
-rw-r--r-- | patches/source/net-snmp/rc.snmpd | 55 | ||||
-rw-r--r-- | patches/source/net-snmp/slack-desc | 19 | ||||
-rw-r--r-- | patches/source/net-snmp/snmpd.conf | 455 | ||||
-rw-r--r-- | patches/source/net-snmp/snmpd.default | 2 | ||||
-rwxr-xr-x | recompress.sh | 7 |
17 files changed, 1106 insertions, 66 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss index 41e6aaf4..afab9c3f 100644 --- a/ChangeLog.rss +++ b/ChangeLog.rss @@ -11,10 +11,42 @@ <description>Tracking Slackware development in git.</description> <language>en-us</language> <id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id> - <pubDate>Wed, 13 Jul 2022 19:56:59 GMT</pubDate> - <lastBuildDate>Thu, 14 Jul 2022 11:30:23 GMT</lastBuildDate> + <pubDate>Thu, 21 Jul 2022 18:13:18 GMT</pubDate> + <lastBuildDate>Fri, 22 Jul 2022 11:30:16 GMT</lastBuildDate> <generator>maintain_current_git.sh v 1.17</generator> <item> + <title>Thu, 21 Jul 2022 18:13:18 GMT</title> + <pubDate>Thu, 21 Jul 2022 18:13:18 GMT</pubDate> + <link>https://git.slackware.nl/current/tag/?h=20220721181318</link> + <guid isPermaLink="false">20220721181318</guid> + <description> + <![CDATA[<pre> +patches/packages/net-snmp-5.9.3-x86_64-1_slack15.0.txz: Upgraded. + This update fixes security issues: + A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause + an out-of-bounds memory access. + A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL + pointer dereference. + Improper Input Validation when SETing malformed OIDs in master agent and + subagent simultaneously. + A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable + can cause an out-of-bounds memory access. + A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a + NULL pointer dereference. + A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer + dereference. + For more information, see: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24805 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24809 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24806 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24807 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24808 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24810 + (* Security fix *) + </pre>]]> + </description> + </item> + <item> <title>Wed, 13 Jul 2022 19:56:59 GMT</title> <pubDate>Wed, 13 Jul 2022 19:56:59 GMT</pubDate> <link>https://git.slackware.nl/current/tag/?h=20220713195659</link> diff --git a/ChangeLog.txt b/ChangeLog.txt index 3dd67490..c91fb9e5 100644 --- a/ChangeLog.txt +++ b/ChangeLog.txt @@ -1,3 +1,27 @@ +Thu Jul 21 18:13:18 UTC 2022 +patches/packages/net-snmp-5.9.3-x86_64-1_slack15.0.txz: Upgraded. + This update fixes security issues: + A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause + an out-of-bounds memory access. + A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL + pointer dereference. + Improper Input Validation when SETing malformed OIDs in master agent and + subagent simultaneously. + A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable + can cause an out-of-bounds memory access. + A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a + NULL pointer dereference. + A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer + dereference. + For more information, see: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24805 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24809 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24806 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24807 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24808 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24810 + (* Security fix *) ++--------------------------+ Wed Jul 13 19:56:59 UTC 2022 patches/packages/xorg-server-1.20.14-x86_64-3_slack15.0.txz: Rebuilt. xkb: switch to array index loops to moving pointers. diff --git a/FILELIST.TXT b/FILELIST.TXT index ba003acc..8fb4fa36 100644 --- a/FILELIST.TXT +++ b/FILELIST.TXT @@ -1,20 +1,20 @@ -Wed Jul 13 20:00:55 UTC 2022 +Thu Jul 21 18:15:38 UTC 2022 Here is the file list for this directory. If you are using a mirror site and find missing or extra files in the disk subdirectories, please have the archive administrator refresh the mirror. -drwxr-xr-x 12 root root 4096 2022-07-13 19:56 . +drwxr-xr-x 12 root root 4096 2022-07-21 18:13 . -rw-r--r-- 1 root root 5767 2022-02-02 22:44 ./ANNOUNCE.15.0 -rw-r--r-- 1 root root 16609 2022-03-30 19:03 ./CHANGES_AND_HINTS.TXT --rw-r--r-- 1 root root 1138810 2022-07-11 19:26 ./CHECKSUMS.md5 --rw-r--r-- 1 root root 163 2022-07-11 19:26 ./CHECKSUMS.md5.asc +-rw-r--r-- 1 root root 1142794 2022-07-13 20:01 ./CHECKSUMS.md5 +-rw-r--r-- 1 root root 163 2022-07-13 20:01 ./CHECKSUMS.md5.asc -rw-r--r-- 1 root root 17976 1994-06-10 02:28 ./COPYING -rw-r--r-- 1 root root 35147 2007-06-30 04:21 ./COPYING3 -rw-r--r-- 1 root root 19573 2016-06-23 20:08 ./COPYRIGHT.TXT -rw-r--r-- 1 root root 616 2006-10-02 04:37 ./CRYPTO_NOTICE.TXT --rw-r--r-- 1 root root 1910578 2022-07-13 19:56 ./ChangeLog.txt +-rw-r--r-- 1 root root 1911823 2022-07-21 18:13 ./ChangeLog.txt drwxr-xr-x 3 root root 4096 2013-03-20 22:17 ./EFI drwxr-xr-x 2 root root 4096 2022-02-02 08:21 ./EFI/BOOT -rw-r--r-- 1 root root 1187840 2021-06-15 19:16 ./EFI/BOOT/bootx64.efi @@ -25,7 +25,7 @@ drwxr-xr-x 2 root root 4096 2022-02-02 08:21 ./EFI/BOOT -rwxr-xr-x 1 root root 2504 2019-07-05 18:54 ./EFI/BOOT/make-grub.sh -rw-r--r-- 1 root root 10722 2013-09-21 19:02 ./EFI/BOOT/osdetect.cfg -rw-r--r-- 1 root root 1273 2013-08-12 21:08 ./EFI/BOOT/tools.cfg --rw-r--r-- 1 root root 1486494 2022-07-11 19:25 ./FILELIST.TXT +-rw-r--r-- 1 root root 1492106 2022-07-13 20:00 ./FILELIST.TXT -rw-r--r-- 1 root root 1572 2012-08-29 18:27 ./GPG-KEY -rw-r--r-- 1 root root 864745 2022-02-02 08:25 ./PACKAGES.TXT -rw-r--r-- 1 root root 8034 2022-02-02 03:36 ./README.TXT @@ -737,13 +737,13 @@ drwxr-xr-x 2 root root 4096 2008-05-07 05:21 ./pasture/source/php/pear -rwxr-xr-x 1 root root 9448 2018-05-16 22:38 ./pasture/source/php/php.SlackBuild -rw-r--r-- 1 root root 775 2017-07-07 19:25 ./pasture/source/php/php.ini-development.diff.gz -rw-r--r-- 1 root root 830 2005-12-09 05:18 ./pasture/source/php/slack-desc -drwxr-xr-x 4 root root 4096 2022-07-13 20:00 ./patches --rw-r--r-- 1 root root 39694 2022-07-13 20:00 ./patches/CHECKSUMS.md5 --rw-r--r-- 1 root root 163 2022-07-13 20:00 ./patches/CHECKSUMS.md5.asc --rw-r--r-- 1 root root 53453 2022-07-13 20:00 ./patches/FILE_LIST --rw-r--r-- 1 root root 11041080 2022-07-13 20:00 ./patches/MANIFEST.bz2 --rw-r--r-- 1 root root 30726 2022-07-13 20:00 ./patches/PACKAGES.TXT -drwxr-xr-x 3 root root 12288 2022-07-13 20:00 ./patches/packages +drwxr-xr-x 4 root root 4096 2022-07-21 18:15 ./patches +-rw-r--r-- 1 root root 40919 2022-07-21 18:15 ./patches/CHECKSUMS.md5 +-rw-r--r-- 1 root root 163 2022-07-21 18:15 ./patches/CHECKSUMS.md5.asc +-rw-r--r-- 1 root root 55019 2022-07-21 18:15 ./patches/FILE_LIST +-rw-r--r-- 1 root root 11074370 2022-07-21 18:15 ./patches/MANIFEST.bz2 +-rw-r--r-- 1 root root 31362 2022-07-21 18:15 ./patches/PACKAGES.TXT +drwxr-xr-x 3 root root 12288 2022-07-21 18:15 ./patches/packages -rw-r--r-- 1 root root 327 2022-02-15 05:07 ./patches/packages/aaa_base-15.0-x86_64-4_slack15.0.txt -rw-r--r-- 1 root root 10716 2022-02-15 05:07 ./patches/packages/aaa_base-15.0-x86_64-4_slack15.0.txz -rw-r--r-- 1 root root 163 2022-02-15 05:07 ./patches/packages/aaa_base-15.0-x86_64-4_slack15.0.txz.asc @@ -829,6 +829,9 @@ drwxr-xr-x 2 root root 4096 2022-05-09 21:37 ./patches/packages/linux-5.15 -rw-r--r-- 1 root root 663 2022-06-29 20:23 ./patches/packages/mozilla-thunderbird-91.11.0-x86_64-1_slack15.0.txt -rw-r--r-- 1 root root 53161900 2022-06-29 20:23 ./patches/packages/mozilla-thunderbird-91.11.0-x86_64-1_slack15.0.txz -rw-r--r-- 1 root root 163 2022-06-29 20:23 ./patches/packages/mozilla-thunderbird-91.11.0-x86_64-1_slack15.0.txz.asc +-rw-r--r-- 1 root root 451 2022-07-21 17:53 ./patches/packages/net-snmp-5.9.3-x86_64-1_slack15.0.txt +-rw-r--r-- 1 root root 1598024 2022-07-21 17:53 ./patches/packages/net-snmp-5.9.3-x86_64-1_slack15.0.txz +-rw-r--r-- 1 root root 163 2022-07-21 17:53 ./patches/packages/net-snmp-5.9.3-x86_64-1_slack15.0.txz.asc -rw-r--r-- 1 root root 559 2022-07-05 19:22 ./patches/packages/openssl-1.1.1q-x86_64-1_slack15.0.txt -rw-r--r-- 1 root root 4025744 2022-07-05 19:22 ./patches/packages/openssl-1.1.1q-x86_64-1_slack15.0.txz -rw-r--r-- 1 root root 163 2022-07-05 19:22 ./patches/packages/openssl-1.1.1q-x86_64-1_slack15.0.txz.asc @@ -892,7 +895,7 @@ drwxr-xr-x 2 root root 4096 2022-05-09 21:37 ./patches/packages/linux-5.15 -rw-r--r-- 1 root root 388 2022-03-28 19:09 ./patches/packages/zlib-1.2.12-x86_64-1_slack15.0.txt -rw-r--r-- 1 root root 105204 2022-03-28 19:09 ./patches/packages/zlib-1.2.12-x86_64-1_slack15.0.txz -rw-r--r-- 1 root root 163 2022-03-28 19:09 ./patches/packages/zlib-1.2.12-x86_64-1_slack15.0.txz.asc -drwxr-xr-x 41 root root 4096 2022-07-13 04:02 ./patches/source +drwxr-xr-x 42 root root 4096 2022-07-21 18:13 ./patches/source drwxr-xr-x 2 root root 4096 2022-01-16 05:07 ./patches/source/aaa_base -rw-r--r-- 1 root root 11041 2022-02-15 04:49 ./patches/source/aaa_base/_aaa_base.tar.gz -rwxr-xr-x 1 root root 3894 2022-02-15 05:07 ./patches/source/aaa_base/aaa_base.SlackBuild @@ -1114,6 +1117,20 @@ drwxr-xr-x 2 root root 4096 2022-06-29 19:14 ./patches/source/mozilla-thun -rw-r--r-- 1 root root 330 2019-08-27 16:35 ./patches/source/mozilla-thunderbird/tb.ui.scrollToClick.diff.gz -rw-r--r-- 1 root root 408098564 2022-06-28 18:45 ./patches/source/mozilla-thunderbird/thunderbird-91.11.0.source.tar.xz -rw-r--r-- 1 root root 833 2022-06-28 18:45 ./patches/source/mozilla-thunderbird/thunderbird-91.11.0.source.tar.xz.asc +drwxr-xr-x 2 root root 4096 2022-07-21 17:44 ./patches/source/net-snmp +-rw-r--r-- 1 root root 356 2021-12-21 18:38 ./patches/source/net-snmp/doinst.sh.gz +-rw-r--r-- 1 root root 607 2018-07-20 09:39 ./patches/source/net-snmp/net-snmp-5.7.2-cert-path.patch.gz +-rw-r--r-- 1 root root 390 2018-07-20 09:39 ./patches/source/net-snmp/net-snmp-5.7.3-iterator-fix.patch.gz +-rw-r--r-- 1 root root 338 2018-07-20 09:39 ./patches/source/net-snmp/net-snmp-5.8-Remove-U64-typedef.patch.gz +-rw-r--r-- 1 root root 1205 2018-07-20 09:39 ./patches/source/net-snmp/net-snmp-5.8-modern-rpm-api.patch.gz +-rw-r--r-- 1 root root 876 2018-07-20 09:39 ./patches/source/net-snmp/net-snmp-5.8-multilib.patch.gz +-rw-r--r-- 1 root root 3870946 2022-07-13 21:40 ./patches/source/net-snmp/net-snmp-5.9.3.tar.lz +-rwxr-xr-x 1 root root 6743 2022-07-21 17:52 ./patches/source/net-snmp/net-snmp.SlackBuild +-rw-r--r-- 1 root root 43 2018-11-09 20:13 ./patches/source/net-snmp/net-snmp.url +-rw-r--r-- 1 root root 981 2021-12-21 18:35 ./patches/source/net-snmp/rc.snmpd +-rw-r--r-- 1 root root 907 2018-02-27 06:13 ./patches/source/net-snmp/slack-desc +-rw-r--r-- 1 root root 4909 2007-04-16 18:39 ./patches/source/net-snmp/snmpd.conf.gz +-rw-r--r-- 1 root root 77 2021-12-21 18:36 ./patches/source/net-snmp/snmpd.default drwxr-xr-x 2 root root 4096 2022-07-05 19:18 ./patches/source/openssl -rw-r--r-- 1 root root 1758 2012-08-08 22:46 ./patches/source/openssl/certwatch.gz -rw-r--r-- 1 root root 281 2007-06-13 17:20 ./patches/source/openssl/doinst.sh-openssl-solibs.gz @@ -2718,23 +2735,23 @@ drwxr-xr-x 2 root root 69632 2022-02-01 08:29 ./slackware64/kde -rw-r--r-- 1 root root 305 2022-01-06 21:46 ./slackware64/kde/kitinerary-21.12.1-x86_64-1.txt -rw-r--r-- 1 root root 914440 2022-01-06 21:46 ./slackware64/kde/kitinerary-21.12.1-x86_64-1.txz -rw-r--r-- 1 root root 163 2022-01-06 21:46 ./slackware64/kde/kitinerary-21.12.1-x86_64-1.txz.asc --rw-r--r-- 1 root root 250 2022-01-08 22:33 ./slackware64/kde/kjobwidgets-5.90.0-x86_64-1.txt --rw-r--r-- 1 root root 145720 2022-01-08 22:33 ./slackware64/kde/kjobwidgets-5.90.0-x86_64-1.txz --rw-r--r-- 1 root root 163 2022-01-08 22:33 ./slackware64/kde/kjobwidgets-5.90.0-x86_64-1.txz.asc --rw-r--r-- 1 root root 263 2021-10-10 21:33 ./slackware64/kde/kjots-20211003_4109f07-x86_64-1.txt --rw-r--r-- 1 root root 212788 2021-10-10 21:33 ./slackware64/kde/kjots-20211003_4109f07-x86_64-1.txz --rw-r--r-- 1 root root 163 2021-10-10 21:33 ./slackware64/kde/kjots-20211003_4109f07-x86_64-1.txz.asc --rw-r--r-- 1 root root 257 2022-01-08 22:44 ./slackware64/kde/kjs-5.90.0-x86_64-1.txt --rw-r--r-- 1 root root 380368 2022-01-08 22:44 ./slackware64/kde/kjs-5.90.0-x86_64-1.txz --rw-r--r-- 1 root root 163 2022-01-08 22:44 ./slackware64/kde/kjs-5.90.0-x86_64-1.txz.asc --rw-r--r-- 1 root root 258 2022-01-08 22:45 ./slackware64/kde/kjsembed-5.90.0-x86_64-1.txt --rw-r--r-- 1 root root 381588 2022-01-08 22:45 ./slackware64/kde/kjsembed-5.90.0-x86_64-1.txz --rw-r--r-- 1 root root 163 2022-01-08 22:45 ./slackware64/kde/kjsembed-5.90.0-x86_64-1.txz.asc --rw-r--r-- 1 root root 385 2022-01-06 22:35 ./slackware64/kde/kjumpingcube-21.12.1-x86_64-1.txt --rw-r--r-- 1 root root 449000 2022-01-06 22:35 ./slackware64/kde/kjumpingcube-21.12.1-x86_64-1.txz --rw-r--r-- 1 root root 163 2022-01-06 22:35 ./slackware64/kde/kjumpingcube-21.12.1-x86_64-1.txz.asc --rw-r--r-- 1 root root 173 2022-01-06 21:39 ./slackware64/kde/kldap-21.12.1-x86_64-1.txt --rw-r--r-- 1 root root 208024 2022-01-06 21:39 ./slackware64/kde/kldap-21.12.1-x86_64-1.txz +-rw-r--r-- 1 root root 250 2022-01-08 22:33 ./slackware64/kde/kjobwidgets-5.90.0-x86_64-1.txt +-rw-r--r-- 1 root root 145720 2022-01-08 22:33 ./slackware64/kde/kjobwidgets-5.90.0-x86_64-1.txz +-rw-r--r-- 1 root root 163 2022-01-08 22:33 ./slackware64/kde/kjobwidgets-5.90.0-x86_64-1.txz.asc +-rw-r--r-- 1 root root 263 2021-10-10 21:33 ./slackware64/kde/kjots-20211003_4109f07-x86_64-1.txt +-rw-r--r-- 1 root root 212788 2021-10-10 21:33 ./slackware64/kde/kjots-20211003_4109f07-x86_64-1.txz +-rw-r--r-- 1 root root 163 2021-10-10 21:33 ./slackware64/kde/kjots-20211003_4109f07-x86_64-1.txz.asc +-rw-r--r-- 1 root root 257 2022-01-08 22:44 ./slackware64/kde/kjs-5.90.0-x86_64-1.txt +-rw-r--r-- 1 root root 380368 2022-01-08 22:44 ./slackware64/kde/kjs-5.90.0-x86_64-1.txz +-rw-r--r-- 1 root root 163 2022-01-08 22:44 ./slackware64/kde/kjs-5.90.0-x86_64-1.txz.asc +-rw-r--r-- 1 root root 258 2022-01-08 22:45 ./slackware64/kde/kjsembed-5.90.0-x86_64-1.txt +-rw-r--r-- 1 root root 381588 2022-01-08 22:45 ./slackware64/kde/kjsembed-5.90.0-x86_64-1.txz +-rw-r--r-- 1 root root 163 2022-01-08 22:45 ./slackware64/kde/kjsembed-5.90.0-x86_64-1.txz.asc +-rw-r--r-- 1 root root 385 2022-01-06 22:35 ./slackware64/kde/kjumpingcube-21.12.1-x86_64-1.txt +-rw-r--r-- 1 root root 449000 2022-01-06 22:35 ./slackware64/kde/kjumpingcube-21.12.1-x86_64-1.txz +-rw-r--r-- 1 root root 163 2022-01-06 22:35 ./slackware64/kde/kjumpingcube-21.12.1-x86_64-1.txz.asc +-rw-r--r-- 1 root root 173 2022-01-06 21:39 ./slackware64/kde/kldap-21.12.1-x86_64-1.txt +-rw-r--r-- 1 root root 208024 2022-01-06 21:39 ./slackware64/kde/kldap-21.12.1-x86_64-1.txz -rw-r--r-- 1 root root 163 2022-01-06 21:39 ./slackware64/kde/kldap-21.12.1-x86_64-1.txz.asc -rw-r--r-- 1 root root 208 2022-01-06 21:46 ./slackware64/kde/kleopatra-21.12.1-x86_64-1.txt -rw-r--r-- 1 root root 2908356 2022-01-06 21:46 ./slackware64/kde/kleopatra-21.12.1-x86_64-1.txz @@ -5475,22 +5492,22 @@ drwxr-xr-x 2 root root 65536 2022-02-01 04:47 ./slackware64/x -rw-r--r-- 1 root root 425 2021-02-13 13:11 ./slackware64/x/transset-1.0.2-x86_64-4.txt -rw-r--r-- 1 root root 19396 2021-02-13 13:11 ./slackware64/x/transset-1.0.2-x86_64-4.txz -rw-r--r-- 1 root root 163 2021-02-13 13:11 ./slackware64/x/transset-1.0.2-x86_64-4.txz.asc --rw-r--r-- 1 root root 620 2021-02-13 13:01 ./slackware64/x/ttf-indic-fonts-0.5.14-noarch-5.txt --rw-r--r-- 1 root root 2969612 2021-02-13 13:01 ./slackware64/x/ttf-indic-fonts-0.5.14-noarch-5.txz --rw-r--r-- 1 root root 163 2021-02-13 13:01 ./slackware64/x/ttf-indic-fonts-0.5.14-noarch-5.txz.asc --rw-r--r-- 1 root root 428 2021-10-19 04:11 ./slackware64/x/ttf-tlwg-0.7.3-noarch-1.txt --rw-r--r-- 1 root root 1946796 2021-10-19 04:11 ./slackware64/x/ttf-tlwg-0.7.3-noarch-1.txz --rw-r--r-- 1 root root 163 2021-10-19 04:11 ./slackware64/x/ttf-tlwg-0.7.3-noarch-1.txz.asc --rw-r--r-- 1 root root 276 2021-02-13 13:11 ./slackware64/x/twm-1.0.11-x86_64-3.txt --rw-r--r-- 1 root root 108700 2021-02-13 13:11 ./slackware64/x/twm-1.0.11-x86_64-3.txz --rw-r--r-- 1 root root 163 2021-02-13 13:11 ./slackware64/x/twm-1.0.11-x86_64-3.txz.asc --rw-r--r-- 1 root root 502 2021-02-13 13:02 ./slackware64/x/urw-core35-fonts-otf-20170801_91edd6e_git-noarch-4.txt --rw-r--r-- 1 root root 1511732 2021-02-13 13:02 ./slackware64/x/urw-core35-fonts-otf-20170801_91edd6e_git-noarch-4.txz --rw-r--r-- 1 root root 163 2021-02-13 13:02 ./slackware64/x/urw-core35-fonts-otf-20170801_91edd6e_git-noarch-4.txz.asc --rw-r--r-- 1 root root 361 2021-02-13 13:05 ./slackware64/x/util-macros-1.19.3-noarch-2.txt --rw-r--r-- 1 root root 31556 2021-02-13 13:05 ./slackware64/x/util-macros-1.19.3-noarch-2.txz --rw-r--r-- 1 root root 163 2021-02-13 13:05 ./slackware64/x/util-macros-1.19.3-noarch-2.txz.asc --rw-r--r-- 1 root root 338 2021-02-13 13:11 ./slackware64/x/viewres-1.0.6-x86_64-3.txt +-rw-r--r-- 1 root root 620 2021-02-13 13:01 ./slackware64/x/ttf-indic-fonts-0.5.14-noarch-5.txt +-rw-r--r-- 1 root root 2969612 2021-02-13 13:01 ./slackware64/x/ttf-indic-fonts-0.5.14-noarch-5.txz +-rw-r--r-- 1 root root 163 2021-02-13 13:01 ./slackware64/x/ttf-indic-fonts-0.5.14-noarch-5.txz.asc +-rw-r--r-- 1 root root 428 2021-10-19 04:11 ./slackware64/x/ttf-tlwg-0.7.3-noarch-1.txt +-rw-r--r-- 1 root root 1946796 2021-10-19 04:11 ./slackware64/x/ttf-tlwg-0.7.3-noarch-1.txz +-rw-r--r-- 1 root root 163 2021-10-19 04:11 ./slackware64/x/ttf-tlwg-0.7.3-noarch-1.txz.asc +-rw-r--r-- 1 root root 276 2021-02-13 13:11 ./slackware64/x/twm-1.0.11-x86_64-3.txt +-rw-r--r-- 1 root root 108700 2021-02-13 13:11 ./slackware64/x/twm-1.0.11-x86_64-3.txz +-rw-r--r-- 1 root root 163 2021-02-13 13:11 ./slackware64/x/twm-1.0.11-x86_64-3.txz.asc +-rw-r--r-- 1 root root 502 2021-02-13 13:02 ./slackware64/x/urw-core35-fonts-otf-20170801_91edd6e_git-noarch-4.txt +-rw-r--r-- 1 root root 1511732 2021-02-13 13:02 ./slackware64/x/urw-core35-fonts-otf-20170801_91edd6e_git-noarch-4.txz +-rw-r--r-- 1 root root 163 2021-02-13 13:02 ./slackware64/x/urw-core35-fonts-otf-20170801_91edd6e_git-noarch-4.txz.asc +-rw-r--r-- 1 root root 361 2021-02-13 13:05 ./slackware64/x/util-macros-1.19.3-noarch-2.txt +-rw-r--r-- 1 root root 31556 2021-02-13 13:05 ./slackware64/x/util-macros-1.19.3-noarch-2.txz +-rw-r--r-- 1 root root 163 2021-02-13 13:05 ./slackware64/x/util-macros-1.19.3-noarch-2.txz.asc +-rw-r--r-- 1 root root 338 2021-02-13 13:11 ./slackware64/x/viewres-1.0.6-x86_64-3.txt -rw-r--r-- 1 root root 26104 2021-02-13 13:11 ./slackware64/x/viewres-1.0.6-x86_64-3.txz -rw-r--r-- 1 root root 163 2021-02-13 13:11 ./slackware64/x/viewres-1.0.6-x86_64-3.txz.asc -rw-r--r-- 1 root root 527 2021-08-08 18:46 ./slackware64/x/vulkan-sdk-1.2.176.1-x86_64-2.txt @@ -15101,23 +15118,23 @@ drwxr-xr-x 52 root root 4096 2022-01-17 21:57 ./source/xap drwxr-xr-x 2 root root 4096 2021-04-18 18:11 ./source/xap/MPlayer -rw-r--r-- 1 root root 222707 2017-10-10 01:18 ./source/xap/MPlayer/Blue-1.13.tar.bz2 -rw-r--r-- 1 root root 5277048 2021-04-18 18:11 ./source/xap/MPlayer/MPlayer-20210418.tar.xz --rwxr-xr-- 1 root root 14378 2021-04-18 18:11 ./source/xap/MPlayer/MPlayer.SlackBuild --rw-r--r-- 1 root root 219 2015-03-09 20:07 ./source/xap/MPlayer/include-samba-4.0.patch.gz --rw-r--r-- 1 root root 1081 2018-08-20 04:29 ./source/xap/MPlayer/slack-desc -drwxr-xr-x 2 root root 4096 2021-09-29 17:02 ./source/xap/NetworkManager-openvpn --rw-r--r-- 1 root root 613848 2021-09-28 19:36 ./source/xap/NetworkManager-openvpn/NetworkManager-openvpn-1.8.16.tar.xz --rwxr-xr-x 1 root root 4493 2021-07-09 18:13 ./source/xap/NetworkManager-openvpn/NetworkManager-openvpn.SlackBuild --rw-r--r-- 1 root root 328 2020-05-04 01:12 ./source/xap/NetworkManager-openvpn/openvpn.nobody.nogroup.diff.gz --rw-r--r-- 1 root root 1027 2020-05-04 01:23 ./source/xap/NetworkManager-openvpn/slack-desc -drwxr-xr-x 2 root root 4096 2021-02-13 05:32 ./source/xap/audacious -drwxr-xr-x 2 root root 4096 2021-02-13 05:32 ./source/xap/audacious-plugins --rw-r--r-- 1 root root 1409774 2021-02-01 23:54 ./source/xap/audacious-plugins/audacious-plugins-4.1.tar.lz --rwxr-xr-x 1 root root 4492 2021-07-13 19:09 ./source/xap/audacious-plugins/audacious-plugins.SlackBuild --rwxr-xr-x 1 root root 4666 2021-07-13 19:09 ./source/xap/audacious-plugins/audacious-plugins.SlackBuild.meson --rw-r--r-- 1 root root 868 2018-10-24 20:29 ./source/xap/audacious-plugins/slack-desc --rw-r--r-- 1 root root 526628 2021-02-01 23:54 ./source/xap/audacious/audacious-4.1.tar.lz --rwxr-xr-x 1 root root 4551 2021-11-18 20:26 ./source/xap/audacious/audacious.SlackBuild --rwxr-xr-x 1 root root 4636 2020-03-22 18:08 ./source/xap/audacious/audacious.SlackBuild.meson +-rwxr-xr-- 1 root root 14378 2021-04-18 18:11 ./source/xap/MPlayer/MPlayer.SlackBuild +-rw-r--r-- 1 root root 219 2015-03-09 20:07 ./source/xap/MPlayer/include-samba-4.0.patch.gz +-rw-r--r-- 1 root root 1081 2018-08-20 04:29 ./source/xap/MPlayer/slack-desc +drwxr-xr-x 2 root root 4096 2021-09-29 17:02 ./source/xap/NetworkManager-openvpn +-rw-r--r-- 1 root root 613848 2021-09-28 19:36 ./source/xap/NetworkManager-openvpn/NetworkManager-openvpn-1.8.16.tar.xz +-rwxr-xr-x 1 root root 4493 2021-07-09 18:13 ./source/xap/NetworkManager-openvpn/NetworkManager-openvpn.SlackBuild +-rw-r--r-- 1 root root 328 2020-05-04 01:12 ./source/xap/NetworkManager-openvpn/openvpn.nobody.nogroup.diff.gz +-rw-r--r-- 1 root root 1027 2020-05-04 01:23 ./source/xap/NetworkManager-openvpn/slack-desc +drwxr-xr-x 2 root root 4096 2021-02-13 05:32 ./source/xap/audacious +drwxr-xr-x 2 root root 4096 2021-02-13 05:32 ./source/xap/audacious-plugins +-rw-r--r-- 1 root root 1409774 2021-02-01 23:54 ./source/xap/audacious-plugins/audacious-plugins-4.1.tar.lz +-rwxr-xr-x 1 root root 4492 2021-07-13 19:09 ./source/xap/audacious-plugins/audacious-plugins.SlackBuild +-rwxr-xr-x 1 root root 4666 2021-07-13 19:09 ./source/xap/audacious-plugins/audacious-plugins.SlackBuild.meson +-rw-r--r-- 1 root root 868 2018-10-24 20:29 ./source/xap/audacious-plugins/slack-desc +-rw-r--r-- 1 root root 526628 2021-02-01 23:54 ./source/xap/audacious/audacious-4.1.tar.lz +-rwxr-xr-x 1 root root 4551 2021-11-18 20:26 ./source/xap/audacious/audacious.SlackBuild +-rwxr-xr-x 1 root root 4636 2020-03-22 18:08 ./source/xap/audacious/audacious.SlackBuild.meson -rw-r--r-- 1 root root 121 2010-04-09 21:15 ./source/xap/audacious/doinst.sh.gz -rw-r--r-- 1 root root 1048 2018-10-24 20:29 ./source/xap/audacious/slack-desc drwxr-xr-x 2 root root 4096 2021-08-05 05:16 ./source/xap/blackbox diff --git a/patches/packages/net-snmp-5.9.3-x86_64-1_slack15.0.txt b/patches/packages/net-snmp-5.9.3-x86_64-1_slack15.0.txt new file mode 100644 index 00000000..66513fcf --- /dev/null +++ b/patches/packages/net-snmp-5.9.3-x86_64-1_slack15.0.txt @@ -0,0 +1,11 @@ +net-snmp: net-snmp (Simple Network Management Protocol tools) +net-snmp: +net-snmp: Various tools relating to the Simple Network Management Protocol: +net-snmp: +net-snmp: An extensible agent +net-snmp: An SNMP library +net-snmp: Tools to request or set information from SNMP agents +net-snmp: Tools to generate and handle SNMP traps +net-snmp: A version of the UNIX 'netstat' command using SNMP +net-snmp: A graphical Perl/Tk/SNMP based mib browser +net-snmp: diff --git a/patches/source/net-snmp/doinst.sh b/patches/source/net-snmp/doinst.sh new file mode 100644 index 00000000..db1cdda6 --- /dev/null +++ b/patches/source/net-snmp/doinst.sh @@ -0,0 +1,24 @@ +#!/bin/sh +config() { + NEW="$1" + OLD="`dirname $NEW`/`basename $NEW .new`" + # If there's no config file by that name, mv it over: + if [ ! -r $OLD ]; then + mv $NEW $OLD + elif [ "`cat $OLD | md5sum`" = "`cat $NEW | md5sum`" ]; then # toss the redundant copy + rm $NEW + fi + # Otherwise, we leave the .new copy for the admin to consider... +} + +# Keep same perms on rc.snmpd.new: +if [ -e etc/rc.d/rc.snmpd ]; then + cp -a etc/rc.d/rc.snmpd etc/rc.d/rc.snmpd.new.incoming + cat etc/rc.d/rc.snmpd.new > etc/rc.d/rc.snmpd.new.incoming + mv etc/rc.d/rc.snmpd.new.incoming etc/rc.d/rc.snmpd.new +fi + +config etc/snmp/snmpd.conf.new +config etc/rc.d/rc.snmpd.new +config etc/default/snmpd.new + diff --git a/patches/source/net-snmp/net-snmp-5.7.2-cert-path.patch b/patches/source/net-snmp/net-snmp-5.7.2-cert-path.patch new file mode 100644 index 00000000..495fccba --- /dev/null +++ b/patches/source/net-snmp/net-snmp-5.7.2-cert-path.patch @@ -0,0 +1,30 @@ +1134475 - dependency in perl package + +Use hardcoded path to configuration directories instead of net-snmp-config. +net-snmp-config is in net-snmp-devel package and we do not want net-snmp-perl +depending on -devel. + +diff -up net-snmp-5.7.2/local/net-snmp-cert.cert-path net-snmp-5.7.2/local/net-snmp-cert +--- net-snmp-5.7.2/local/net-snmp-cert.cert-path 2012-10-10 00:28:58.000000000 +0200 ++++ net-snmp-5.7.2/local/net-snmp-cert 2014-09-01 12:05:10.582427036 +0200 +@@ -819,8 +819,7 @@ sub set_default { + sub cfg_path { + my $path; + +- $path = `$NetSNMP::Cert::CFGTOOL --snmpconfpath`; +- chomp $path; ++ $path = "/etc/snmp:/usr/share/snmp:/usr/lib64/snmp:/home/jsafrane/.snmp:/var/lib/net-snmp"; + return (wantarray ? split(':', $path) : $path); + } + +@@ -1414,8 +1413,8 @@ sub checkReqs { + die("$NetSNMP::Cert::OPENSSL (v$ossl_ver): must be $ossl_min_ver or later") + if ($ossl_ver cmp $ossl_min_ver) < 0; + +- die("$NetSNMP::Cert::CFGTOOL not found: please install") +- if system("$NetSNMP::Cert::CFGTOOL > /dev/null 2>&1"); ++# die("$NetSNMP::Cert::CFGTOOL not found: please install") ++# if system("$NetSNMP::Cert::CFGTOOL > /dev/null 2>&1"); + } + + sub initOpts { diff --git a/patches/source/net-snmp/net-snmp-5.7.3-iterator-fix.patch b/patches/source/net-snmp/net-snmp-5.7.3-iterator-fix.patch new file mode 100644 index 00000000..1505ca9a --- /dev/null +++ b/patches/source/net-snmp/net-snmp-5.7.3-iterator-fix.patch @@ -0,0 +1,14 @@ +diff -urNp old/agent/mibgroup/host/data_access/swrun.c new/agent/mibgroup/host/data_access/swrun.c +--- old/agent/mibgroup/host/data_access/swrun.c 2018-03-26 09:00:39.932335587 +0200 ++++ new/agent/mibgroup/host/data_access/swrun.c 2018-03-26 09:03:00.845876681 +0200 +@@ -102,7 +102,9 @@ swrun_count_processes_by_name( char *nam + return 0; /* or -1 */ + + it = CONTAINER_ITERATOR( swrun_container ); +- while ((entry = (netsnmp_swrun_entry*)ITERATOR_NEXT( it )) != NULL) { ++ for (entry = (netsnmp_swrun_entry*)ITERATOR_FIRST( it ); ++ entry; ++ entry = (netsnmp_swrun_entry*)ITERATOR_NEXT( it )) { + if (0 == strcmp( entry->hrSWRunName, name )) + i++; + } diff --git a/patches/source/net-snmp/net-snmp-5.8-Remove-U64-typedef.patch b/patches/source/net-snmp/net-snmp-5.8-Remove-U64-typedef.patch new file mode 100644 index 00000000..75a2c6df --- /dev/null +++ b/patches/source/net-snmp/net-snmp-5.8-Remove-U64-typedef.patch @@ -0,0 +1,12 @@ +diff -urNp a/include/net-snmp/library/int64.h b/include/net-snmp/library/int64.h +--- a/include/net-snmp/library/int64.h 2018-07-18 14:37:16.543348832 +0200 ++++ b/include/net-snmp/library/int64.h 2018-07-18 15:31:31.516999288 +0200 +@@ -10,7 +10,7 @@ extern "C" { + * Note: using the U64 typedef is deprecated because this typedef conflicts + * with a typedef with the same name defined in the Perl header files. + */ +- typedef struct counter64 U64; ++// typedef struct counter64 U64; + #endif + + #define I64CHARSZ 21 diff --git a/patches/source/net-snmp/net-snmp-5.8-modern-rpm-api.patch b/patches/source/net-snmp/net-snmp-5.8-modern-rpm-api.patch new file mode 100644 index 00000000..93fcc63f --- /dev/null +++ b/patches/source/net-snmp/net-snmp-5.8-modern-rpm-api.patch @@ -0,0 +1,83 @@ +diff -urNp a/agent/mibgroup/host/data_access/swinst_rpm.c b/agent/mibgroup/host/data_access/swinst_rpm.c +--- a/agent/mibgroup/host/data_access/swinst_rpm.c 2018-07-18 16:12:19.583503903 +0200 ++++ b/agent/mibgroup/host/data_access/swinst_rpm.c 2018-07-18 16:50:38.599703588 +0200 +@@ -102,7 +102,6 @@ netsnmp_swinst_arch_load( netsnmp_contai + rpmtd td_name, td_version, td_release, td_group, td_time; + #else + char *n, *v, *r, *g; +- int32_t *t; + #endif + time_t install_time; + size_t date_len; +@@ -146,14 +145,13 @@ netsnmp_swinst_arch_load( netsnmp_contai + install_time = rpmtdGetNumber(td_time); + g = rpmtdGetString(td_group); + #else +- headerGetEntry( h, RPMTAG_NAME, NULL, (void**)&n, NULL); +- headerGetEntry( h, RPMTAG_VERSION, NULL, (void**)&v, NULL); +- headerGetEntry( h, RPMTAG_RELEASE, NULL, (void**)&r, NULL); +- headerGetEntry( h, RPMTAG_GROUP, NULL, (void**)&g, NULL); +- headerGetEntry( h, RPMTAG_INSTALLTIME, NULL, (void**)&t, NULL); ++ n = headerGetString( h, RPMTAG_NAME); ++ v = headerGetString( h, RPMTAG_VERSION); ++ r = headerGetString( h, RPMTAG_RELEASE); ++ g = headerGetString( h, RPMTAG_GROUP); ++ install_time = headerGetNumber( h, RPMTAG_INSTALLTIME); + entry->swName_len = snprintf( entry->swName, sizeof(entry->swName), + "%s-%s-%s", n, v, r); +- install_time = *t; + #endif + entry->swType = (g && NULL != strstr( g, "System Environment")) + ? 2 /* operatingSystem */ +diff -urNp a/agent/mibgroup/host/hr_swinst.c b/agent/mibgroup/host/hr_swinst.c +--- a/agent/mibgroup/host/hr_swinst.c 2018-07-18 16:12:19.582503907 +0200 ++++ b/agent/mibgroup/host/hr_swinst.c 2018-07-18 17:09:29.716564197 +0200 +@@ -479,9 +479,9 @@ var_hrswinst(struct variable * vp, + } + #else + # ifdef HAVE_LIBRPM +- char *rpm_groups; +- if ( headerGetEntry(swi->swi_h, RPMTAG_GROUP, NULL, (void **) &rpm_groups, NULL) ) { +- if ( strstr(rpm_groups, "System Environment") != NULL ) ++ const char *rpm_group = headerGetString(swi->swi_h, RPMTAG_GROUP); ++ if ( NULL != rpm_group ) { ++ if ( strstr(rpm_group, "System Environment") != NULL ) + long_return = 2; /* operatingSystem */ + else + long_return = 4; /* applcation */ +@@ -498,9 +498,8 @@ var_hrswinst(struct variable * vp, + case HRSWINST_DATE: + { + #ifdef HAVE_LIBRPM +- int32_t *rpm_data; +- if ( headerGetEntry(swi->swi_h, RPMTAG_INSTALLTIME, NULL, (void **) &rpm_data, NULL) ) { +- time_t installTime = *rpm_data; ++ time_t installTime = headerGetNumber(swi->swi_h, RPMTAG_INSTALLTIME); ++ if ( 0 != installTime ) { + ret = date_n_time(&installTime, var_len); + } else { + ret = date_n_time(NULL, var_len); +@@ -660,7 +659,7 @@ Save_HR_SW_info(int ix) + if (1 <= ix && ix <= swi->swi_nrec && ix != swi->swi_prevx) { + int offset; + Header h; +- char *n, *v, *r; ++ const char *n, *v, *r; + + offset = swi->swi_recs[ix - 1]; + +@@ -685,11 +684,9 @@ Save_HR_SW_info(int ix) + swi->swi_h = h; + swi->swi_prevx = ix; + +- headerGetEntry(swi->swi_h, RPMTAG_NAME, NULL, (void **) &n, NULL); +- headerGetEntry(swi->swi_h, RPMTAG_VERSION, NULL, (void **) &v, +- NULL); +- headerGetEntry(swi->swi_h, RPMTAG_RELEASE, NULL, (void **) &r, +- NULL); ++ n = headerGetString(swi->swi_h, RPMTAG_NAME); ++ v = headerGetString(swi->swi_h, RPMTAG_VERSION); ++ r = headerGetString(swi->swi_h, RPMTAG_RELEASE); + snprintf(swi->swi_name, sizeof(swi->swi_name), "%s-%s-%s", n, v, r); + swi->swi_name[ sizeof(swi->swi_name)-1 ] = 0; + } diff --git a/patches/source/net-snmp/net-snmp-5.8-multilib.patch b/patches/source/net-snmp/net-snmp-5.8-multilib.patch new file mode 100644 index 00000000..b8f3feac --- /dev/null +++ b/patches/source/net-snmp/net-snmp-5.8-multilib.patch @@ -0,0 +1,45 @@ +diff -urNp a/man/netsnmp_config_api.3.def b/man/netsnmp_config_api.3.def +--- a/man/netsnmp_config_api.3.def 2018-07-18 11:18:06.196792766 +0200 ++++ b/man/netsnmp_config_api.3.def 2018-07-18 11:20:04.631679886 +0200 +@@ -295,7 +295,7 @@ for one particular machine. + .PP + The default list of directories to search is \fC SYSCONFDIR/snmp\fP, + followed by \fC DATADIR/snmp\fP, +-followed by \fC LIBDIR/snmp\fP, ++followed by \fC /usr/lib(64)/snmp\fP, + followed by \fC $HOME/.snmp\fP. + This list can be changed by setting the environmental variable + .I SNMPCONFPATH +@@ -367,7 +367,7 @@ A colon separated list of directories to + files in. + Default: + .br +-SYSCONFDIR/snmp:\:DATADIR/snmp:\:LIBDIR/snmp:\:$HOME/.snmp ++SYSCONFDIR/snmp:\:DATADIR/snmp:\:/usr/lib(64)/snmp:\:$HOME/.snmp + .SH "SEE ALSO" + netsnmp_mib_api(3), snmp_api(3) + .\" Local Variables: +diff -urNp a/man/snmp_config.5.def b/man/snmp_config.5.def +--- a/man/snmp_config.5.def 2018-07-18 11:18:06.194792767 +0200 ++++ b/man/snmp_config.5.def 2018-07-18 11:20:56.423626117 +0200 +@@ -10,7 +10,7 @@ First off, there are numerous places tha + found and read from. By default, the applications look for + configuration files in the following 4 directories, in order: + SYSCONFDIR/snmp, +-DATADIR/snmp, LIBDIR/snmp, and $HOME/.snmp. In each of these ++DATADIR/snmp, /usr/lib(64)/snmp, and $HOME/.snmp. In each of these + directories, it looks for files snmp.conf, snmpd.conf and/or + snmptrapd.conf, as well as snmp.local.conf, snmpd.local.conf + and/or snmptrapd.local.conf. *.local.conf are always +diff -urNp a/man/snmpd.conf.5.def b/man/snmpd.conf.5.def +--- a/man/snmpd.conf.5.def 2018-07-18 11:18:06.196792766 +0200 ++++ b/man/snmpd.conf.5.def 2018-07-18 11:21:44.263574388 +0200 +@@ -1559,7 +1559,7 @@ filename), and call the initialisation r + .RS + .IP "Note:" + If the specified PATH is not a fully qualified filename, it will +-be interpreted relative to LIBDIR/snmp/dlmod, and \fC.so\fR ++be interpreted relative to /usr/lib(64)/snmp/dlmod, and \fC.so\fR + will be appended to the filename. + .RE + .PP diff --git a/patches/source/net-snmp/net-snmp.SlackBuild b/patches/source/net-snmp/net-snmp.SlackBuild new file mode 100755 index 00000000..a8f9a94c --- /dev/null +++ b/patches/source/net-snmp/net-snmp.SlackBuild @@ -0,0 +1,209 @@ +#!/bin/bash + +# Copyright 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2014, 2018, 2020, 2021 Patrick J. Volkerding, Sebeka, MN, USA +# All rights reserved. +# +# Redistribution and use of this script, with or without modification, is +# permitted provided that the following conditions are met: +# +# 1. Redistributions of this script must retain the above copyright +# notice, this list of conditions and the following disclaimer. +# +# THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED +# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF +# MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO +# EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, +# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, +# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; +# OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, +# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR +# OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF +# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +cd $(dirname $0) ; CWD=$(pwd) + +PKGNAM=net-snmp +VERSION=${VERSION:-$(echo $PKGNAM-*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)} +BUILD=${BUILD:-1_slack15.0} + +# Automatically determine the architecture we're building on: +if [ -z "$ARCH" ]; then + case "$( uname -m )" in + i?86) export ARCH=i586 ;; + arm*) export ARCH=arm ;; + # Unless $ARCH is already set, use uname -m for all other archs: + *) export ARCH=$( uname -m ) ;; + esac +fi + +# If the variable PRINT_PACKAGE_NAME is set, then this script will report what +# the name of the created package would be, and then exit. This information +# could be useful to other scripts. +if [ ! -z "${PRINT_PACKAGE_NAME}" ]; then + echo "$PKGNAM-$VERSION-$ARCH-$BUILD.txz" + exit 0 +fi + +TMP=${TMP:-/tmp} +PKG=$TMP/package-${PKGNAM} +rm -rf $PKG +mkdir -p $TMP $PKG + +if [ "$ARCH" = "i586" ]; then + SLKCFLAGS="-O2 -march=i586 -mtune=i686" + LIBDIRSUFFIX="" +elif [ "$ARCH" = "s390" ]; then + SLKCFLAGS="-O2" + LIBDIRSUFFIX="" +elif [ "$ARCH" = "x86_64" ]; then + SLKCFLAGS="-O2 -fPIC" + LIBDIRSUFFIX="64" +else + SLKCFLAGS="-O2" + LIBDIRSUFFIX="" +fi + +NUMJOBS=${NUMJOBS:-" -j $(expr $(nproc) + 1) "} + +cd $TMP +rm -rf ${PKGNAM}-${VERSION} +tar xvf $CWD/${PKGNAM}-$VERSION.tar.?z || exit 1 +cd ${PKGNAM}-$VERSION || exit 1 + +# Make sure ownerships and permissions are sane: +chown -R root:root . +find . \ + \( -perm 777 -o -perm 775 -o -perm 711 -o -perm 555 -o -perm 511 \) \ + -exec chmod 755 {} \+ -o \ + \( -perm 666 -o -perm 664 -o -perm 600 -o -perm 444 -o -perm 440 -o -perm 400 \) \ + -exec chmod 644 {} \+ + +zcat $CWD/net-snmp-5.8-multilib.patch.gz | patch -p1 --verbose || exit 1 +zcat $CWD/net-snmp-5.7.2-cert-path.patch.gz | patch -p1 --verbose || exit 1 +zcat $CWD/net-snmp-5.8-Remove-U64-typedef.patch.gz | patch -p1 --verbose || exit 1 +zcat $CWD/net-snmp-5.7.3-iterator-fix.patch.gz | patch -p1 --verbose || exit 1 +zcat $CWD/net-snmp-5.8-modern-rpm-api.patch.gz | patch -p1 --verbose || exit 1 + +# Fix destdir for python modules +#sed -i "s|\$(PYMAKE) install|\$(PYMAKE) install --root=$PKG|" \ +# Makefile.in + +# Configure: +CFLAGS="$SLKCFLAGS" \ +./configure \ + --prefix=/usr \ + --libdir=/usr/lib${LIBDIRSUFFIX} \ + --sysconfdir=/etc/snmp \ + --mandir=/usr/man \ + --enable-ipv6 \ + --disable-debugging \ + --enable-static=no \ + --with-libwrap \ + --with-mysql \ + --with-perl-modules \ + --with-default-snmp-version=3 \ + --with-sys-contact="root@example.org" \ + --with-sys-location="unknown" \ + --with-logfile="/var/log/snmpd.log" \ + --with-persistent-directory="/var/lib/net-snmp" \ + --without-rpm \ + --program-suffix= \ + --program-prefix= \ + --with-mib-modules="ucd-snmp/lmsensorsMib ucd-snmp/diskio" \ + --with-python-modules \ + --build=$ARCH-slackware-linux || exit 1 + +# Build and install: +make $NUMJOBS INSTALLDIRS=vendor || exit 1 +make install INSTALLDIRS=vendor DESTDIR=$PKG || exit 1 + +# Don't ship .la files: +rm -f $PKG/{,usr/}lib${LIBDIRSUFFIX}/*.la + +# Evidently --mandir=/usr/man doesn't catch everything... +if [ -d $PKG/usr/share/man/man3 ]; then + mkdir -p $PKG/usr/man/man3 + mv $PKG/usr/share/man/man3/* $PKG/usr/man/man3 + rmdir $PKG/usr/share/man/man3 $PKG/usr/share/man +fi +mkdir -p $PKG/usr +mkdir -p $PKG/var/lib/net-snmp/{cert,mib}_indexes +mkdir -p $PKG/etc/snmp +zcat $CWD/snmpd.conf.gz > $PKG/etc/snmp/snmpd.conf.new +mkdir -p $PKG/etc/rc.d +cat $CWD/rc.snmpd > $PKG/etc/rc.d/rc.snmpd.new + +# Install default options file for snmpd: +mkdir -p $PKG/etc/default +cat $CWD/snmpd.default > $PKG/etc/default/snmpd.new + +# Strip binaries: +find $PKG | xargs file | grep -e "executable" -e "shared object" | grep ELF \ + | cut -f 1 -d : | xargs strip --strip-unneeded 2> /dev/null + +# Compress and link manpages, if any: +if [ -d $PKG/usr/man ]; then + ( cd $PKG/usr/man + for manpagedir in $(find . -type d -name "man*") ; do + ( cd $manpagedir + for eachpage in $( find . -type l -maxdepth 1) ; do + ln -s $( readlink $eachpage ).gz $eachpage.gz + rm $eachpage + done + gzip -9 *.* + ) + done + ) +fi + +# Compress info files, if any: +if [ -d $PKG/usr/info ]; then + ( cd $PKG/usr/info + rm -f dir + gzip -9 * + ) +fi + +# Remove perllocal files: +( cd $PKG ; find . -name perllocal.pod -exec rm "{}" \+ ) + +# This removes our DESTDIR from the packlist filenames, to keep perl's +# internal inventories consistent and correct. +find $PKG -name .packlist | while read plist ; do + sed -e "s%$PKG%%g" \ + -e "s%/share/man%/man%g" \ + -re "s%\.([1-9]n?|3pm)$%&.gz%g # extend man filenames for .gz" \ + ${plist} > ${plist}.new + mv -f ${plist}.new ${plist} +done + +# Add a documentation directory: +mkdir -p $PKG/usr/doc/${PKGNAM}-$VERSION +cp -a \ + AGENT* CHANGES ChangeLog COPYING* CodingStyle EXAMPLE* FAQ \ + INSTALL NEWS PORTING README* TODO \ + $PKG/usr/doc/${PKGNAM}-$VERSION + +# If there's a ChangeLog, installing at least part of the recent history +# is useful, but don't let it get totally out of control: +if [ -r ChangeLog ]; then + DOCSDIR=$(echo $PKG/usr/doc/*-$VERSION) + cat ChangeLog | head -n 1000 > $DOCSDIR/ChangeLog + touch -r ChangeLog $DOCSDIR/ChangeLog +fi + +# If there's a CHANGES file, installing at least part of the recent history +# is useful, but don't let it get totally out of control: +if [ -r CHANGES ]; then + DOCSDIR=$(echo $PKG/usr/doc/*-$VERSION) + cat CHANGES | head -n 1000 > $DOCSDIR/CHANGES + touch -r CHANGES $DOCSDIR/CHANGES +fi + +mkdir -p $PKG/install +zcat $CWD/doinst.sh.gz > $PKG/install/doinst.sh +cat $CWD/slack-desc > $PKG/install/slack-desc + +cd $PKG +/sbin/makepkg -l y -c n $TMP/${PKGNAM}-$VERSION-$ARCH-$BUILD.txz + diff --git a/patches/source/net-snmp/net-snmp.url b/patches/source/net-snmp/net-snmp.url new file mode 100644 index 00000000..fc69349b --- /dev/null +++ b/patches/source/net-snmp/net-snmp.url @@ -0,0 +1 @@ +https://sourceforge.net/projects/net-snmp/ diff --git a/patches/source/net-snmp/rc.snmpd b/patches/source/net-snmp/rc.snmpd new file mode 100644 index 00000000..ae847e68 --- /dev/null +++ b/patches/source/net-snmp/rc.snmpd @@ -0,0 +1,55 @@ +#!/bin/sh +# +# rc.snmpd This shell script takes care of starting and stopping +# the net-snmp SNMP daemon + +[ -r /etc/default/snmpd ] && . /etc/default/snmpd +SNMPD_OPTIONS=${SNMPD_OPTIONS:-"-A -p /var/run/snmpd -a"} + +start() { + if [ -x /usr/sbin/snmpd -a -f /etc/snmp/snmpd.conf ]; then + echo -n "Starting snmpd: " + /usr/sbin/snmpd $SNMPD_OPTIONS -c /etc/snmp/snmpd.conf + echo " /usr/sbin/snmpd $SNMPD_OPTIONS -c /etc/snmp/snmpd.conf" + fi +} + +stop() { + # Stop daemons. + COUNT=0 + echo -n "Shutting down snmpd: " + while `killall snmpd 2>/dev/null`; do + echo -n "." + sleep 1 + COUNT=$((COUNT+1)) + if [ $COUNT -ge 30 ]; then + killall -9 snmpd + sleep 1 + break + fi + done + echo " DONE" +} + +# See how we were called. +case "$1" in + start) + start + ;; + stop) + stop + ;; + restart|reload) + stop + start + ;; + condrestart) + if [ -f /var/run/snmpd ]; then + stop + start + fi + ;; + *) + echo $"Usage: $0 {start|stop|restart|condrestart}" + ;; +esac diff --git a/patches/source/net-snmp/slack-desc b/patches/source/net-snmp/slack-desc new file mode 100644 index 00000000..eb13539d --- /dev/null +++ b/patches/source/net-snmp/slack-desc @@ -0,0 +1,19 @@ +# HOW TO EDIT THIS FILE: +# The "handy ruler" below makes it easier to edit a package description. Line +# up the first '|' above the ':' following the base package name, and the '|' +# on the right side marks the last column you can put a character in. You must +# make exactly 11 lines for the formatting to be correct. It's also +# customary to leave one space after the ':'. + + |-----handy-ruler------------------------------------------------------| +net-snmp: net-snmp (Simple Network Management Protocol tools) +net-snmp: +net-snmp: Various tools relating to the Simple Network Management Protocol: +net-snmp: +net-snmp: An extensible agent +net-snmp: An SNMP library +net-snmp: Tools to request or set information from SNMP agents +net-snmp: Tools to generate and handle SNMP traps +net-snmp: A version of the UNIX 'netstat' command using SNMP +net-snmp: A graphical Perl/Tk/SNMP based mib browser +net-snmp: diff --git a/patches/source/net-snmp/snmpd.conf b/patches/source/net-snmp/snmpd.conf new file mode 100644 index 00000000..51dce4ed --- /dev/null +++ b/patches/source/net-snmp/snmpd.conf @@ -0,0 +1,455 @@ +############################################################################### +# +# snmpd.conf: +# An example configuration file for configuring the ucd-snmp snmpd agent. +# +############################################################################### +# +# This file is intended to only be as a starting point. Many more +# configuration directives exist than are mentioned in this file. For +# full details, see the snmpd.conf(5) manual page. +# +# All lines beginning with a '#' are comments and are intended for you +# to read. All other lines are configuration commands for the agent. + +############################################################################### +# Access Control +############################################################################### + +# As shipped, the snmpd demon will only respond to queries on the +# system mib group until this file is replaced or modified for +# security purposes. Examples are shown below about how to increase the +# level of access. + +# By far, the most common question I get about the agent is "why won't +# it work?", when really it should be "how do I configure the agent to +# allow me to access it?" +# +# By default, the agent responds to the "public" community for read +# only access, if run out of the box without any configuration file in +# place. The following examples show you other ways of configuring +# the agent so that you can change the community names, and give +# yourself write access to the mib tree as well. +# +# For more information, read the FAQ as well as the snmpd.conf(5) +# manual page. + +#### +# First, map the community name "public" into a "security name" + +# sec.name source community +com2sec notConfigUser default public + +#### +# Second, map the security name into a group name: + +# groupName securityModel securityName +group notConfigGroup v1 notConfigUser +group notConfigGroup v2c notConfigUser + +#### +# Third, create a view for us to let the group have rights to: + +# Make at least snmpwalk -v 1 localhost -c public system fast again. +# name incl/excl subtree mask(optional) +view systemview included .1.3.6.1.2.1.1 +view systemview included .1.3.6.1.2.1.25.1.1 + +#### +# Finally, grant the group read-only access to the systemview view. + +# group context sec.model sec.level prefix read write notif +access notConfigGroup "" any noauth exact systemview none none + +# ----------------------------------------------------------------------------- + +# Here is a commented out example configuration that allows less +# restrictive access. + +# YOU SHOULD CHANGE THE "COMMUNITY" TOKEN BELOW TO A NEW KEYWORD ONLY +# KNOWN AT YOUR SITE. YOU *MUST* CHANGE THE NETWORK TOKEN BELOW TO +# SOMETHING REFLECTING YOUR LOCAL NETWORK ADDRESS SPACE. + +## sec.name source community +#com2sec local localhost COMMUNITY +#com2sec mynetwork NETWORK/24 COMMUNITY + +## group.name sec.model sec.name +#group MyRWGroup any local +#group MyROGroup any mynetwork +# +#group MyRWGroup any otherv3user +#... + +## incl/excl subtree mask +#view all included .1 80 + +## -or just the mib2 tree- + +#view mib2 included .iso.org.dod.internet.mgmt.mib-2 fc + + +## context sec.model sec.level prefix read write notif +#access MyROGroup "" any noauth 0 all none none +#access MyRWGroup "" any noauth 0 all all all + + +############################################################################### +# Sample configuration to make net-snmpd RFC 1213. +# Unfortunately v1 and v2c don't allow any user based authentification, so +# opening up the default config is not an option from a security point. +# +# WARNING: If you uncomment the following lines you allow write access to your +# snmpd daemon from any source! To avoid this use different names for your +# community or split out the write access to a different community and +# restrict it to your local network. +# Also remember to comment the syslocation and syscontact parameters later as +# otherwise they are still read only (see FAQ for net-snmp). +# + +# First, map the community name "public" into a "security name" +# sec.name source community +#com2sec notConfigUser default public + +# Second, map the security name into a group name: +# groupName securityModel securityName +#group notConfigGroup v1 notConfigUser +#group notConfigGroup v2c notConfigUser + +# Third, create a view for us to let the group have rights to: +# Open up the whole tree for ro, make the RFC 1213 required ones rw. +# name incl/excl subtree mask(optional) +#view roview included .1 +#view rwview included system.sysContact +#view rwview included system.sysName +#view rwview included system.sysLocation +#view rwview included interfaces.ifTable.ifEntry.ifAdminStatus +#view rwview included at.atTable.atEntry.atPhysAddress +#view rwview included at.atTable.atEntry.atNetAddress +#view rwview included ip.ipForwarding +#view rwview included ip.ipDefaultTTL +#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteDest +#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteIfIndex +#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteMetric1 +#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteMetric2 +#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteMetric3 +#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteMetric4 +#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteType +#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteAge +#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteMask +#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteMetric5 +#view rwview included ip.ipNetToMediaTable.ipNetToMediaEntry.ipNetToMediaIfIndex +#view rwview included ip.ipNetToMediaTable.ipNetToMediaEntry.ipNetToMediaPhysAddress +#view rwview included ip.ipNetToMediaTable.ipNetToMediaEntry.ipNetToMediaNetAddress +#view rwview included ip.ipNetToMediaTable.ipNetToMediaEntry.ipNetToMediaType +#view rwview included tcp.tcpConnTable.tcpConnEntry.tcpConnState +#view rwview included egp.egpNeighTable.egpNeighEntry.egpNeighEventTrigger +#view rwview included snmp.snmpEnableAuthenTraps + +# Finally, grant the group read-only access to the systemview view. +# group context sec.model sec.level prefix read write notif +#access notConfigGroup "" any noauth exact roview rwview none + + + +############################################################################### +# System contact information +# + +# It is also possible to set the sysContact and sysLocation system +# variables through the snmpd.conf file: + +syslocation Unknown (edit /etc/snmp/snmpd.conf) +syscontact Root <root@localhost> (configure /etc/snmp/snmp.local.conf) + +# Example output of snmpwalk: +# % snmpwalk -v 1 localhost -c public system +# system.sysDescr.0 = "SunOS name sun4c" +# system.sysObjectID.0 = OID: enterprises.ucdavis.ucdSnmpAgent.sunos4 +# system.sysUpTime.0 = Timeticks: (595637548) 68 days, 22:32:55 +# system.sysContact.0 = "Me <me@somewhere.org>" +# system.sysName.0 = "name" +# system.sysLocation.0 = "Right here, right now." +# system.sysServices.0 = 72 + + +# ----------------------------------------------------------------------------- + + +############################################################################### +# Process checks. +# +# The following are examples of how to use the agent to check for +# processes running on the host. The syntax looks something like: +# +# proc NAME [MAX=0] [MIN=0] +# +# NAME: the name of the process to check for. It must match +# exactly (ie, http will not find httpd processes). +# MAX: the maximum number allowed to be running. Defaults to 0. +# MIN: the minimum number to be running. Defaults to 0. + +# +# Examples (commented out by default): +# + +# Make sure mountd is running +#proc mountd + +# Make sure there are no more than 4 ntalkds running, but 0 is ok too. +#proc ntalkd 4 + +# Make sure at least one sendmail, but less than or equal to 10 are running. +#proc sendmail 10 1 + +# A snmpwalk of the process mib tree would look something like this: +# +# % snmpwalk -v 1 localhost -c public .1.3.6.1.4.1.2021.2 +# enterprises.ucdavis.procTable.prEntry.prIndex.1 = 1 +# enterprises.ucdavis.procTable.prEntry.prIndex.2 = 2 +# enterprises.ucdavis.procTable.prEntry.prIndex.3 = 3 +# enterprises.ucdavis.procTable.prEntry.prNames.1 = "mountd" +# enterprises.ucdavis.procTable.prEntry.prNames.2 = "ntalkd" +# enterprises.ucdavis.procTable.prEntry.prNames.3 = "sendmail" +# enterprises.ucdavis.procTable.prEntry.prMin.1 = 0 +# enterprises.ucdavis.procTable.prEntry.prMin.2 = 0 +# enterprises.ucdavis.procTable.prEntry.prMin.3 = 1 +# enterprises.ucdavis.procTable.prEntry.prMax.1 = 0 +# enterprises.ucdavis.procTable.prEntry.prMax.2 = 4 +# enterprises.ucdavis.procTable.prEntry.prMax.3 = 10 +# enterprises.ucdavis.procTable.prEntry.prCount.1 = 0 +# enterprises.ucdavis.procTable.prEntry.prCount.2 = 0 +# enterprises.ucdavis.procTable.prEntry.prCount.3 = 1 +# enterprises.ucdavis.procTable.prEntry.prErrorFlag.1 = 1 +# enterprises.ucdavis.procTable.prEntry.prErrorFlag.2 = 0 +# enterprises.ucdavis.procTable.prEntry.prErrorFlag.3 = 0 +# enterprises.ucdavis.procTable.prEntry.prErrMessage.1 = "No mountd process running." +# enterprises.ucdavis.procTable.prEntry.prErrMessage.2 = "" +# enterprises.ucdavis.procTable.prEntry.prErrMessage.3 = "" +# enterprises.ucdavis.procTable.prEntry.prErrFix.1 = 0 +# enterprises.ucdavis.procTable.prEntry.prErrFix.2 = 0 +# enterprises.ucdavis.procTable.prEntry.prErrFix.3 = 0 +# +# Note that the errorFlag for mountd is set to 1 because one is not +# running (in this case an rpc.mountd is, but thats not good enough), +# and the ErrMessage tells you what's wrong. The configuration +# imposed in the snmpd.conf file is also shown. +# +# Special Case: When the min and max numbers are both 0, it assumes +# you want a max of infinity and a min of 1. +# + + +# ----------------------------------------------------------------------------- + + +############################################################################### +# Executables/scripts +# + +# +# You can also have programs run by the agent that return a single +# line of output and an exit code. Here are two examples. +# +# exec NAME PROGRAM [ARGS ...] +# +# NAME: A generic name. +# PROGRAM: The program to run. Include the path! +# ARGS: optional arguments to be passed to the program + +# a simple hello world + +#exec echotest /bin/echo hello world + +# Run a shell script containing: +# +# #!/bin/sh +# echo hello world +# echo hi there +# exit 35 +# +# Note: this has been specifically commented out to prevent +# accidental security holes due to someone else on your system writing +# a /tmp/shtest before you do. Uncomment to use it. +# +#exec shelltest /bin/sh /tmp/shtest + +# Then, +# % snmpwalk -v 1 localhost -c public .1.3.6.1.4.1.2021.8 +# enterprises.ucdavis.extTable.extEntry.extIndex.1 = 1 +# enterprises.ucdavis.extTable.extEntry.extIndex.2 = 2 +# enterprises.ucdavis.extTable.extEntry.extNames.1 = "echotest" +# enterprises.ucdavis.extTable.extEntry.extNames.2 = "shelltest" +# enterprises.ucdavis.extTable.extEntry.extCommand.1 = "/bin/echo hello world" +# enterprises.ucdavis.extTable.extEntry.extCommand.2 = "/bin/sh /tmp/shtest" +# enterprises.ucdavis.extTable.extEntry.extResult.1 = 0 +# enterprises.ucdavis.extTable.extEntry.extResult.2 = 35 +# enterprises.ucdavis.extTable.extEntry.extOutput.1 = "hello world." +# enterprises.ucdavis.extTable.extEntry.extOutput.2 = "hello world." +# enterprises.ucdavis.extTable.extEntry.extErrFix.1 = 0 +# enterprises.ucdavis.extTable.extEntry.extErrFix.2 = 0 + +# Note that the second line of the /tmp/shtest shell script is cut +# off. Also note that the exit status of 35 was returned. + +# ----------------------------------------------------------------------------- + + +############################################################################### +# disk checks +# + +# The agent can check the amount of available disk space, and make +# sure it is above a set limit. + +# disk PATH [MIN=100000] +# +# PATH: mount path to the disk in question. +# MIN: Disks with space below this value will have the Mib's errorFlag set. +# Default value = 100000. + +# Check the / partition and make sure it contains at least 10 megs. + +#disk / 10000 + +# % snmpwalk -v 1 localhost -c public .1.3.6.1.4.1.2021.9 +# enterprises.ucdavis.diskTable.dskEntry.diskIndex.1 = 0 +# enterprises.ucdavis.diskTable.dskEntry.diskPath.1 = "/" Hex: 2F +# enterprises.ucdavis.diskTable.dskEntry.diskDevice.1 = "/dev/dsk/c201d6s0" +# enterprises.ucdavis.diskTable.dskEntry.diskMinimum.1 = 10000 +# enterprises.ucdavis.diskTable.dskEntry.diskTotal.1 = 837130 +# enterprises.ucdavis.diskTable.dskEntry.diskAvail.1 = 316325 +# enterprises.ucdavis.diskTable.dskEntry.diskUsed.1 = 437092 +# enterprises.ucdavis.diskTable.dskEntry.diskPercent.1 = 58 +# enterprises.ucdavis.diskTable.dskEntry.diskErrorFlag.1 = 0 +# enterprises.ucdavis.diskTable.dskEntry.diskErrorMsg.1 = "" + +# ----------------------------------------------------------------------------- + + +############################################################################### +# load average checks +# + +# load [1MAX=12.0] [5MAX=12.0] [15MAX=12.0] +# +# 1MAX: If the 1 minute load average is above this limit at query +# time, the errorFlag will be set. +# 5MAX: Similar, but for 5 min average. +# 15MAX: Similar, but for 15 min average. + +# Check for loads: +#load 12 14 14 + +# % snmpwalk -v 1 localhost -c public .1.3.6.1.4.1.2021.10 +# enterprises.ucdavis.loadTable.laEntry.loadaveIndex.1 = 1 +# enterprises.ucdavis.loadTable.laEntry.loadaveIndex.2 = 2 +# enterprises.ucdavis.loadTable.laEntry.loadaveIndex.3 = 3 +# enterprises.ucdavis.loadTable.laEntry.loadaveNames.1 = "Load-1" +# enterprises.ucdavis.loadTable.laEntry.loadaveNames.2 = "Load-5" +# enterprises.ucdavis.loadTable.laEntry.loadaveNames.3 = "Load-15" +# enterprises.ucdavis.loadTable.laEntry.loadaveLoad.1 = "0.49" Hex: 30 2E 34 39 +# enterprises.ucdavis.loadTable.laEntry.loadaveLoad.2 = "0.31" Hex: 30 2E 33 31 +# enterprises.ucdavis.loadTable.laEntry.loadaveLoad.3 = "0.26" Hex: 30 2E 32 36 +# enterprises.ucdavis.loadTable.laEntry.loadaveConfig.1 = "12.00" +# enterprises.ucdavis.loadTable.laEntry.loadaveConfig.2 = "14.00" +# enterprises.ucdavis.loadTable.laEntry.loadaveConfig.3 = "14.00" +# enterprises.ucdavis.loadTable.laEntry.loadaveErrorFlag.1 = 0 +# enterprises.ucdavis.loadTable.laEntry.loadaveErrorFlag.2 = 0 +# enterprises.ucdavis.loadTable.laEntry.loadaveErrorFlag.3 = 0 +# enterprises.ucdavis.loadTable.laEntry.loadaveErrMessage.1 = "" +# enterprises.ucdavis.loadTable.laEntry.loadaveErrMessage.2 = "" +# enterprises.ucdavis.loadTable.laEntry.loadaveErrMessage.3 = "" + +# ----------------------------------------------------------------------------- + + +############################################################################### +# Extensible sections. +# + +# This alleviates the multiple line output problem found in the +# previous executable mib by placing each mib in its own mib table: + +# Run a shell script containing: +# +# #!/bin/sh +# echo hello world +# echo hi there +# exit 35 +# +# Note: this has been specifically commented out to prevent +# accidental security holes due to someone else on your system writing +# a /tmp/shtest before you do. Uncomment to use it. +# +# exec .1.3.6.1.4.1.2021.50 shelltest /bin/sh /tmp/shtest + +# % snmpwalk -v 1 localhost -c public .1.3.6.1.4.1.2021.50 +# enterprises.ucdavis.50.1.1 = 1 +# enterprises.ucdavis.50.2.1 = "shelltest" +# enterprises.ucdavis.50.3.1 = "/bin/sh /tmp/shtest" +# enterprises.ucdavis.50.100.1 = 35 +# enterprises.ucdavis.50.101.1 = "hello world." +# enterprises.ucdavis.50.101.2 = "hi there." +# enterprises.ucdavis.50.102.1 = 0 + +# Now the Output has grown to two lines, and we can see the 'hi +# there.' output as the second line from our shell script. +# +# Note that you must alter the mib.txt file to be correct if you want +# the .50.* outputs above to change to reasonable text descriptions. + +# Other ideas: +# +# exec .1.3.6.1.4.1.2021.51 ps /bin/ps +# exec .1.3.6.1.4.1.2021.52 top /usr/local/bin/top +# exec .1.3.6.1.4.1.2021.53 mailq /usr/bin/mailq + +# ----------------------------------------------------------------------------- + + +############################################################################### +# Pass through control. +# + +# Usage: +# pass MIBOID EXEC-COMMAND +# +# This will pass total control of the mib underneath the MIBOID +# portion of the mib to the EXEC-COMMAND. +# +# Note: You'll have to change the path of the passtest script to your +# source directory or install it in the given location. +# +# Example: (see the script for details) +# (commented out here since it requires that you place the +# script in the right location. (its not installed by default)) + +# pass .1.3.6.1.4.1.2021.255 /bin/sh /usr/local/local/passtest + +# % snmpwalk -v 1 localhost -c public .1.3.6.1.4.1.2021.255 +# enterprises.ucdavis.255.1 = "life the universe and everything" +# enterprises.ucdavis.255.2.1 = 42 +# enterprises.ucdavis.255.2.2 = OID: 42.42.42 +# enterprises.ucdavis.255.3 = Timeticks: (363136200) 42 days, 0:42:42 +# enterprises.ucdavis.255.4 = IpAddress: 127.0.0.1 +# enterprises.ucdavis.255.5 = 42 +# enterprises.ucdavis.255.6 = Gauge: 42 +# +# % snmpget -v 1 localhost public .1.3.6.1.4.1.2021.255.5 +# enterprises.ucdavis.255.5 = 42 +# +# % snmpset -v 1 localhost public .1.3.6.1.4.1.2021.255.1 s "New string" +# enterprises.ucdavis.255.1 = "New string" +# + +# For specific usage information, see the man/snmpd.conf.5 manual page +# as well as the local/passtest script used in the above example. + +# Added for support of bcm5820 cards. +pass .1.3.6.1.4.1.4413.4.1 /usr/bin/ucd5820stat + +############################################################################### +# Further Information +# +# See the snmpd.conf manual page, and the output of "snmpd -H". diff --git a/patches/source/net-snmp/snmpd.default b/patches/source/net-snmp/snmpd.default new file mode 100644 index 00000000..a7db0a29 --- /dev/null +++ b/patches/source/net-snmp/snmpd.default @@ -0,0 +1,2 @@ +# Options to use when running snmpd: +SNMPD_OPTIONS="-A -p /var/run/snmpd -a" diff --git a/recompress.sh b/recompress.sh index 53e2e0e4..2d7464e9 100755 --- a/recompress.sh +++ b/recompress.sh @@ -1184,6 +1184,13 @@ gzip ./patches/source/seamonkey/sm.ui.scrollToClick.diff gzip ./patches/source/vim/ctags.use-conventional-unused-marker.patch gzip ./patches/source/vim/vim.vimrc.diff gzip ./patches/source/libxslt/libxslt.xsltMaxDepth.diff +gzip ./patches/source/net-snmp/net-snmp-5.7.2-cert-path.patch +gzip ./patches/source/net-snmp/net-snmp-5.8-Remove-U64-typedef.patch +gzip ./patches/source/net-snmp/net-snmp-5.8-multilib.patch +gzip ./patches/source/net-snmp/snmpd.conf +gzip ./patches/source/net-snmp/doinst.sh +gzip ./patches/source/net-snmp/net-snmp-5.7.3-iterator-fix.patch +gzip ./patches/source/net-snmp/net-snmp-5.8-modern-rpm-api.patch gzip ./patches/source/openssl/doinst.sh-openssl-solibs gzip ./patches/source/openssl/doinst.sh-openssl gzip ./patches/source/openssl/certwatch |