On 2020-07-19 20:25, Craig Small wrote:
> A patch has been applied to the Net-SNMP v5.8 and master branches that
> removes the EXTEND MIB from the list with default MIBs. See also commit
> c2b96ee74439 ("snmpd: Disable NET-SNMP-EXTEND-MIB support by default").
>
> Is the single line re
Please trim quoted emails when replying.
Net-SNMP version 5.7.3, the version included in Debian, is no longer
maintained upstream.
A patch has been applied to the Net-SNMP v5.8 and master branches that
removes the EXTEND MIB from the list with default MIBs. See also commit
c2b96ee74439 ("snmpd: D
Package: snmpd
Version: 5.7.3
The report below comes from USD AG (https://www.usd.de). I am forwarding
this report to the Debian organization because I think the root cause is
not in the upstream Net-SNMP project but instead in how the Debian
project packaged the Net-SNMP software. I see two possi
Can someone backport the upstream bug fix mentioned in
https://bugs.kde.org/show_bug.cgi?id=398324?
On 01/12/18 13:06, Sebastian Andrzej Siewior wrote:
On 2018-01-12 21:44:19 [+0100], Magnus Fromreide wrote:
On Thu, Jan 11, 2018 at 07:07:45PM -0800, Bart Van Assche wrote:
On 12/23/17 15:17, Sebastian Andrzej Siewior wrote:
added those, added a const and removed the "HAVE_EVP_MD_CTX_C
On 01/12/18 12:44, Magnus Fromreide wrote:
On Thu, Jan 11, 2018 at 07:07:45PM -0800, Bart Van Assche wrote:
On 12/23/17 15:17, Sebastian Andrzej Siewior wrote:
added those, added a const and removed the "HAVE_EVP_MD_CTX_CREATE" thingy.
Hello Sebastian and Andreas,
Please have a l
On 12/23/17 15:17, Sebastian Andrzej Siewior wrote:
added those, added a const and removed the "HAVE_EVP_MD_CTX_CREATE" thingy.
Hello Sebastian and Andreas,
Please have a look at the current trunk. OpenSSL 1.1.0 support was added
several weeks ago.
Thanks,
Bart.
On 11/14/17 21:44, Leon Romanovsky wrote:
On Tue, Nov 14, 2017 at 03:41:13PM -0500, Don Dutile wrote:
Jason:
Why am I being cc'd on this debian bug?
I also received a notice about a bug fix in debian, and I had zip to do with it.
Is my name tagged in Debian wrt rdma for some reason? by someone?
Hello Ana,
Thank you for the quick follow-up. The entire e-mail thread is available at
http://www.spinics.net/lists/linux-rdma/msg49668.html. Please let me know if you
need more information than what is available in that e-mail thread.
Bart.
The conclusion of a discussion on the linux-rdma mailing list is that
the "Don't activate any targets per default" change should be reverted.
Whom should be contacted to perform that revert?
10 matches
Mail list logo