Package nagios: Information

    Source package: nagios
    Version: 3.0.6-alt16
    Build time:  Jul 19, 2021, 04:40 AM in the task #279672
    Category: Monitoring
    Report package bug
    License: GPL
    Summary: Services and network monitoring system
    Description: 
    Nagios(R) is a host and service monitor designed to inform you of network
    problems before your clients, end-users or managers do. It has been
    designed to run under the Linux operating system, but works fine under
    most *NIX variants as well. The monitoring daemon runs intermittent
    checks on hosts and services you specify using external "plugins" which
    return status information to Nagios(R). When problems are encountered, the
    daemon can send notifications out to administrative contacts in a variety
    of different ways (email, instant message, SMS, etc.). Current status
    information, historical logs, and reports can all be accessed via a web
    browser.

    List of rpms provided by this srpm:
    nagios (x86_64, ppc64le, i586, armh, aarch64)
    nagios-common (x86_64, ppc64le, i586, armh, aarch64)
    nagios-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
    nagios-doc (noarch)
    nagios-full (x86_64, ppc64le, i586, armh, aarch64)
    nagios-www (x86_64, ppc64le, i586, armh, aarch64)
    nagios-www-apache2 (x86_64, ppc64le, i586, armh, aarch64)
    nagios-www-lighttpd (x86_64, ppc64le, i586, armh, aarch64)

    Maintainer: Dmitry Lebkov


      1. libjpeg-devel
      2. libltdl7-devel
      3. perl-devel
      4. traceroute
      5. libgd2-devel
      6. glib2-devel
      7. libpng-devel

    Last changed


    May 27, 2021 Igor Vlasenko 3.0.6-alt16
    - rebuild for girar bug #38332
    Jan. 27, 2021 Paul Wolneykien 3.0.6-alt15
    - Fixes:
      + CVE-2017-12847 Kill arbitrary processes by leveraging access to PID file.
    - Don't install the PID file.
    Jan. 27, 2021 Paul Wolneykien 3.0.6-alt14
    - Fixes:
      + CVE-2016-8641 Privilege escalation via symbolic links.
      + CVE-2016-9566 Gaining root privileges via a symlink attack on the log file.
      + CVE-2014-1878 Possible segfault in cmd.cgi.