A vulnerability has been detected on the Nagios web interface.
Attackers may exploit this vulnerability to gain access to sensitive information or crash the affected application, denying service to legitimate users.
To guarantee the security of your system, we recommend applying last released patch: neteye-3.12.1-3.5.1p8.nagios.1.x86_64.rpm .
Update your system using following commands:
yum clean all --enablerepo=neteye
yum update neteye-3.12.0 --enablerepo=neteye
Fix support for Alyvix Nodes with older versions We solved an issue that could cause Test Cases to be not shown in the Alyvix UI if the Alyvix Nodes supported only API version 3 (i.e. Alyvix Service version <= 2.5). Read More
Fix for Broken Links in the Icinga Web 2 Business Process Module We have resolved an issue that caused broken links within the Business Process module. In certain cases, links pointing to monitoring objects were generated incorrectly, resulting in users Read More
Passive Checks Stuck in Pending During Director Deployments A race condition during Director deployments caused some passive checks to remain in a pending state instead of updating properly. This behavior has now been corrected. With the fix in place, passive Read More
Passive Checks Stuck in Pending During Director Deployments A race condition during Director deployments caused some passive checks to remain in a pending state instead of updating properly. This behavior has now been corrected. With the fix in place, passive Read More
A safer way to run privileged Windows checks with SystemRunner If you’ve been monitoring Windows for a while, you’ve probably seen this pattern: some checks must run as LocalSystem (S-1-5-18), and the “quick fix” is to run the Icinga Agent Read More