./net/nagios-base, Network monitor

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: pkgsrc-2013Q2, Version: 3.4.4, Package name: nagios-base-3.4.4, Maintainer: pkgsrc-users

Nagios is a program that will monitor hosts and services on your
network. It has the ability to email or page you when a problem arises
and when it gets resolved. Nagios is written in C and is designed to
run under Linux, although it should work under most other *NIX variants.
It can run either as a normal process or as a daemon, intermittently
running checks on various services that you specify. The actual service
checks are performed by external "plugins" which return service
information to Nagios. Several CGI programs are included with Nagios
in order to allow you to view the current service status, history, etc.
via a web browser.

This package provides the core nagios infrastructure and web pages.


Required to run:
[graphics/gd] [lang/perl5] [lang/php54]

Master sites:

SHA1: 19aaa4eda92a2837fe29ebcbe85140aef50e90cd
RMD160: 328fefc30d03b18bf757d619f36ea6747ea4efdc
Filesize: 1744.636 KB

Version history: (Expand)


CVS history: (Expand)


   2013-08-06 14:22:42 by Matthias Scheler | Files touched by this commit (2) | Package updated
Log message:
Pullup ticket #4201 - requested by obache
net/nagios-base: security update

Revisions pulled up:
- net/nagios-base/Makefile                                      1.47
- net/nagios-base/distinfo                                      1.17

---
   Module Name:	pkgsrc
   Committed By:	obache
   Date:		Mon Aug  5 10:43:55 UTC 2013

   Modified Files:
   	pkgsrc/net/nagios-base: Makefile distinfo

   Log message:
   Update nagios-base to 3.4.4.

   3.4.4 - 01/12/2013
   ------------------
   * Reenabled check for newer versions of Nagios Core (Mike Guthrie)
   * Fixed bug #408: service checks get duplicated on reload (Eric Stanley)
   * Fixed bug #401: segmentation fault on Solaris when parsing unknown timeperiod
      directives. (Eric Stanley)
   * Added NULL pointer checks to CGI code. (Eric Stanley)
   * Fixed buffer overflow vulnerability in CGI code. Thanks to Neohapsis
        (http://archives.neohapsis.com/archives/fulldisclosure/2012-12/0108.html)
      for finding this. (Eric Stanley)