Bug Fixes for NetEye 4.45
Bug Fix We updated the version of GLPI in order to fix some relevant vulnerabilities. List of updated packages The following packages have been updated for NetEye 4.45:
Read MoreBug Fix We updated the version of GLPI in order to fix some relevant vulnerabilities. List of updated packages The following packages have been updated for NetEye 4.45:
Read MoreBug Fix in Tornado Module We solved an issue in Tornado’s rule configuration where the action_name field in director actions was being cleared after saving and deploying. When users created a rule with a director action and filled in both action_name and action_payload, the action_name value would disappear upon returning to the rule configuration. This…
Read MoreImportant: Elastic Stack security update Type/Severity NetEye Product Security has rated this update as having a High security impact. Topic An update for the elastic-stack packages (elasticsearch, kibana, filebeat, logstash and elastic-agent) is now available for NetEye 4. Security Fix for NetEye 4.45 CVEs The CVEs include an Information Disclosure vulnerability, a Server-Side Request Forgery and 5 Denial…
Read MoreElastic Enterprise license renewal Previously, the Elastic Enterprise license was scheduled to expire on February 28, 2026.With this update, the Elastic Enterprise license has been renewed and will now expire on December 31, 2026. In the case the health-check light/01004_elastic_license_check.sh is preventing you from updating your NetEye Installation you can run the following command: neteye update –skip-tags check_health….
Read MoreImportant: Elastic Stack security update Type/Severity NetEye Product Security has rated this update as having a High security impact. Topic An update for the elastic-stack packages (elasticsearch, kibana, filebeat, logstash and elastic-agent) is now available for NetEye 4. Security Fix for NetEye 4.45 CVEs The CVEs affect different components of the Elastic Stack, as outlined below. Packetbeat CVEs:…
Read MoreFix upgrade 4.45 migration error We solved an issue that affected the upgrade to NetEye 4.45. The issue occurred during the migration of the monitoring role permissions to Icinga DB, due to the order in which packages were updated. List of updated packages To solve the issues mentioned above, the following packages have been updated…
Read MoreFix NetEye web UI exception We solved an issue that affected the NetEye web UI, when the SLM feature module is not installed, causing an exception to be thrown. List of updated packages To solve the issues mentioned above, the following packages have been updated for NetEye 4.45:
Read MoreFix for memory corruption in icinga2 We solved an issue that affected icinga2. If the cleanup of the http sessions in the execute-script endpoint ran during a request, the re-balance in the internal datastructure would corrupt the requests memory, resulting in erroneous behaviors or crashes of icinga2. List of updated packages To solve the issues…
Read MoreFix El Proxy Kibana plugin activity We solved an issue that affected the El Proxy Kibana plugin which, in case many Fleet agent policies were associated with an integration, caused a large number of index template updates, possibly resulting in a temporary cluster slowdown. List of updated packages To solve the issues mentioned above, the…
Read MoreFix support for Alyvix Nodes with older versions We solved an issue that could cause Test Cases to be not shown in the Alyvix UI if the Alyvix Nodes supported only API version 3 (i.e. Alyvix Service version <= 2.5). List of updated packages To solve the issues mentioned above, the following packages have been…
Read MoreFix for Broken Links in the Icinga Web 2 Business Process Module We have resolved an issue that caused broken links within the Business Process module. In certain cases, links pointing to monitoring objects were generated incorrectly, resulting in users being unable to navigate to the relevant monitoring details. This has now been fixed, and…
Read MorePassive Checks Stuck in Pending During Director Deployments A race condition during Director deployments caused some passive checks to remain in a pending state instead of updating properly. This behavior has now been corrected. With the fix in place, passive checks will transition to the correct state without requiring manual intervention. List of updated packages…
Read MorePassive Checks Stuck in Pending During Director Deployments A race condition during Director deployments caused some passive checks to remain in a pending state instead of updating properly. This behavior has now been corrected. With the fix in place, passive checks will transition to the correct state without requiring manual intervention. List of updated packages…
Read MoreImportant: Icinga2 security update Type/Severity NetEye Product Security has rated this update as having a High security impact. Topic An update for the icinga2 packages is now available for NetEye 4. Security Fix for NetEye 4.44 CVEs The CVEs include three different vulnerabilities: an Information Disclosure, a Denial of Service and a Limited Privilege Escalation. For a detailed…
Read MoreImportant: Elastic Stack security update Type/Severity NetEye Product Security has rated this update as having a High security impact. Topic An update for the elasticsearch and kibana packages is now available for NetEye 4. Security Fix for NetEye 4.44 CVEs The CVEs include three XSS vulnerabilities and two Broken Access Control vulnerabilities. For a detailed overview of the…
Read More