Package nagios: Information
Source package: nagios
Version: 3.0.6-alt16
Build time: Sep 27, 2022, 09:55 AM
Category: Monitoring
Report package bugHome page: http://www.nagios.org
License: GPL
Summary: Services and network monitoring system
Description:
Nagios(R) is a host and service monitor designed to inform you of network problems before your clients, end-users or managers do. It has been designed to run under the Linux operating system, but works fine under most *NIX variants as well. The monitoring daemon runs intermittent checks on hosts and services you specify using external "plugins" which return status information to Nagios(R). When problems are encountered, the daemon can send notifications out to administrative contacts in a variety of different ways (email, instant message, SMS, etc.). Current status information, historical logs, and reports can all be accessed via a web browser.
List of rpms provided by this srpm:
nagios (e2kv6, e2kv5, e2kv4, e2k)
nagios-common (e2kv6, e2kv5, e2kv4, e2k)
nagios-debuginfo (e2kv6, e2kv5, e2kv4, e2k)
nagios-doc (noarch)
nagios-full (e2kv6, e2kv5, e2kv4, e2k)
nagios-www (e2kv6, e2kv5, e2kv4, e2k)
nagios-www-apache2 (e2kv6, e2kv5, e2kv4, e2k)
nagios-www-lighttpd (e2kv6, e2kv5, e2kv4, e2k)
nagios (e2kv6, e2kv5, e2kv4, e2k)
nagios-common (e2kv6, e2kv5, e2kv4, e2k)
nagios-debuginfo (e2kv6, e2kv5, e2kv4, e2k)
nagios-doc (noarch)
nagios-full (e2kv6, e2kv5, e2kv4, e2k)
nagios-www (e2kv6, e2kv5, e2kv4, e2k)
nagios-www-apache2 (e2kv6, e2kv5, e2kv4, e2k)
nagios-www-lighttpd (e2kv6, e2kv5, e2kv4, e2k)
Maintainer: Dmitry Lebkov
List of contributors:
Igor Vlasenko
Paul Wolneykien
Anton V. Boyarshinov
Denis Medvedev
Aleksei Nikiforov
Vladimir Lettiev
Alexey Tourbin
Dmitry Lebkov
Stanislav Ievlev
Igor Vlasenko
Paul Wolneykien
Anton V. Boyarshinov
Denis Medvedev
Aleksei Nikiforov
Vladimir Lettiev
Alexey Tourbin
Dmitry Lebkov
Stanislav Ievlev
Last changed
May 27, 2021 Igor Vlasenko 3.0.6-alt16
- rebuild for girar bug #38332
Jan. 27, 2021 Paul Wolneykien 3.0.6-alt15
- Fixes: + CVE-2017-12847 Kill arbitrary processes by leveraging access to PID file. - Don't install the PID file.
Jan. 27, 2021 Paul Wolneykien 3.0.6-alt14
- Fixes: + CVE-2016-8641 Privilege escalation via symbolic links. + CVE-2016-9566 Gaining root privileges via a symlink attack on the log file. + CVE-2014-1878 Possible segfault in cmd.cgi.