Your message dated Thu, 07 Jul 2005 08:17:18 -0400
with message-id <[EMAIL PROTECTED]>
and subject line Bug#317253: fixed in cacti 0.8.6f-2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 7 Jul 2005 05:29:33 +0000
>From [EMAIL PROTECTED] Wed Jul 06 22:29:33 2005
Return-path: <[EMAIL PROTECTED]>
Received: from (ellis.commongroundpublishing.com) [210.8.122.33] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DqOx3-0002Ii-00; Wed, 06 Jul 2005 22:29:33 -0700
Received: by ellis.commongroundpublishing.com (Postfix, from userid 1000)
        id B73968747C; Thu,  7 Jul 2005 15:28:58 +1000 (EST)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: David MacKinnon <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: cacti: Error in snmp.php
X-Mailer: reportbug 3.12
Date: Thu, 07 Jul 2005 15:28:58 +1000
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: cacti
Version: 0.8.6f-1
Severity: normal


In cacti 0.8.6f-1 there is an error in
/usr/share/cacti/site/lib/snmp.php

On line 47 $snmp_community and $snmp_version should be $community and
$version respectively. This error causes pretty much all SNMP
functionality on cacti to fail. Bug does not seem to appear in the
upstream release, so I presume it's a Debian patch.

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.11-rc4
Locale: LANG=en_AU, LC_CTYPE=en_AU (charmap=ISO-8859-1)

Versions of packages cacti depends on:
ii  apache                       1.3.33-6    versatile, high-performance HTTP s
ii  debconf                      1.4.50      Debian configuration management sy
ii  libphp-adodb                 4.52-1      The 'adodb' database abstraction l
ii  logrotate                    3.7-5       Log rotation utility
ii  mysql-client                 4.0.24-10   mysql database client binaries
ii  php4                         4:4.3.10-15 server-side, HTML-embedded scripti
ii  php4-cli                     4:4.3.10-15 command-line interpreter for the p
ii  php4-mysql                   4:4.3.10-15 MySQL module for php4
ii  php4-snmp                    4:4.3.10-15 SNMP module for php4
ii  rrdtool                      1.0.49-1    Time-series data storage and displ
ii  snmp                         5.1.2-6.1   NET SNMP (Simple Network Managemen
ii  ucf                          1.18        Update Configuration File: preserv

-- debconf information:
* cacti/username: cacti
  cacti/poller_name: /usr/share/cacti/cmd.php
* cacti/mysql_server: localhost
* cacti/webserver: Apache
* cacti/save_rootpw: true
* cacti/dump_location: /var/cache/cacti/dumps
* cacti/default-poller: cacti
  cacti/upgrade_warning:
* cacti/root_mysql: root
* cacti/no_automagic:
  cacti/no_mysql: false
* cacti/purge_db: true
* cacti/no_mysql_message:
* cacti/database: cacti
  cacti/mismatch:

---------------------------------------
Received: (at 317253-close) by bugs.debian.org; 7 Jul 2005 12:24:54 +0000
>From [EMAIL PROTECTED] Thu Jul 07 05:24:54 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DqVR0-000790-00; Thu, 07 Jul 2005 05:24:54 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1DqVJe-0006oy-00; Thu, 07 Jul 2005 08:17:18 -0400
From: sean finney <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#317253: fixed in cacti 0.8.6f-2
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Thu, 07 Jul 2005 08:17:18 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 2

Source: cacti
Source-Version: 0.8.6f-2

We believe that the bug you reported is fixed in the latest version of
cacti, which is due to be installed in the Debian FTP archive:

cacti_0.8.6f-2.diff.gz
  to pool/main/c/cacti/cacti_0.8.6f-2.diff.gz
cacti_0.8.6f-2.dsc
  to pool/main/c/cacti/cacti_0.8.6f-2.dsc
cacti_0.8.6f-2_all.deb
  to pool/main/c/cacti/cacti_0.8.6f-2_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
sean finney <[EMAIL PROTECTED]> (supplier of updated cacti package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Thu, 07 Jul 2005 08:05:17 -0400
Source: cacti
Binary: cacti
Architecture: source all
Version: 0.8.6f-2
Distribution: unstable
Urgency: high
Maintainer: sean finney <[EMAIL PROTECTED]>
Changed-By: sean finney <[EMAIL PROTECTED]>
Description: 
 cacti      - Frontend to rrdtool for monitoring systems and services
Closes: 317137 317253
Changes: 
 cacti (0.8.6f-2) unstable; urgency=high
 .
   * new version of the upstream 'sanity checking' patches introduced
     in 0.8.6e-2 (closes: #317253).
   * the updated Czech debconf translation from Martin Sín somehow
     got mixed up with the debconf translation for mysql.  fixed.
     (closes: #317137).
   * for posterity, the security updates included in the previous
     update have the following CAN numbers assigned to them:
     - CAN-2005-2148 (hardened-php advisories 032005 and 042005)
     - CAN-2005-2149 (hardened-php advisory 052005)
   * even though it's been like 5 days, and the previous version's urgency
     was set to high, it has not entered testing, so urgency will remain
     at this level.
Files: 
 4fc888a8d4df5f0b76fdb968844a4dd8 583 web extra cacti_0.8.6f-2.dsc
 ddbdc9256f111fc52624cb28c762659e 29211 web extra cacti_0.8.6f-2.diff.gz
 fd0dd8712e21fdc432cef758e395e8a2 856482 web extra cacti_0.8.6f-2_all.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFCzRqVynjLPm522B0RAozWAJ9XFpSbwOXD0DDFrZ01B8WT+ZtAfgCdFXPk
RBHlPU60AaoJl+6rlmm8pwE=
=S8Qy
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to