A vulnerability has been detected on the Nagios web interface.
Attackers may exploit this vulnerability to gain access to sensitive information or crash the affected application, denying service to legitimate users.
To guarantee the security of your system, we recommend applying last released patch: neteye-3.12.1-3.5.1p8.nagios.1.x86_64.rpm .
Update your system using following commands:
yum clean all --enablerepo=neteye
yum update neteye-3.12.0 --enablerepo=neteye
We fixed a bug that was setting an incorrect target version during the upgrade. For NetEye 4.22 we updated the following package: neteye-upgrade-manager to version 0.12.24-1
We fixed a bug which could cause Icinga 2 to not behave correctly when the Smart Director was enabled. This bug was occurring when Icinga 2 started before the DRBD of Icinga Web 2 was started. For NetEye 4.23 we Read More
We fixed a bug which could cause Icinga 2 to not behave correctly when the Smart Director was enabled. This bug was occurring when Icinga 2 started before the DRBD of Icinga Web 2 was started. For NetEye 4.22 we Read More
In Tornado we lowered the default values for the retries of the Smart Monitoring action. The previous default values was leading to a too long waiting time during the block of Smart Monitoring actions performed before the Icinga 2 restarts Read More
In Tornado we lowered the default values for the retries of the Smart Monitoring action. The previous default values was leading to a too long waiting time during the block of Smart Monitoring actions performed before the Icinga 2 restarts Read More