Debian Package Tracker
Register | Log in
Subscribe

monit

utility for monitoring and managing daemons or similar programs

Choose email to subscribe with

general
  • source: monit (main)
  • version: 1:5.27.1-1
  • maintainer: Sergey B Kirpichev (DMD) (DM)
  • arch: any
  • std-ver: 4.5.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1:5.9-1+deb8u1
  • o-o-sec: 1:5.9-1+deb8u2
  • oldstable: 1:5.20.0-6+deb9u1
  • stable-bpo: 1:5.27.1-1~bpo10+1
  • testing: 1:5.27.1-1
  • unstable: 1:5.27.1-1
versioned links
  • 1:5.9-1+deb8u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:5.9-1+deb8u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:5.20.0-6+deb9u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:5.27.1-1~bpo10+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:5.27.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • monit
action needed
A new upstream version is available: 5.27.2 high
A new upstream version 5.27.2 is available, you should consider packaging it.
Created: 2021-01-21 Last update: 2021-01-24 06:55
2 ignored security issues in stretch low
There are 2 open security issues in stretch.
2 issues skipped by the security teams:
  • CVE-2019-11454: Persistent cross-site scripting (XSS) in http/cervlet.c in Tildeslash Monit before 5.25.3 allows a remote unauthenticated attacker to introduce arbitrary JavaScript via manipulation of an unsanitized user field of the Authorization header for HTTP Basic Authentication, which is mishandled during an _viewlog operation.
  • CVE-2019-11455: A buffer over-read in Util_urlDecode in util.c in Tildeslash Monit before 5.25.3 allows a remote authenticated attacker to retrieve the contents of adjacent memory via manipulation of GET or POST parameters. The attacker can also cause a denial of service (application outage).
Please fix them.
Created: 2019-04-23 Last update: 2020-10-30 09:53
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.5.1 instead of 4.5.0).
Created: 2020-11-17 Last update: 2020-11-17 05:41
testing migrations
  • This package will soon be part of the auto-openssl transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
news
[rss feed]
  • [2020-11-06] Accepted monit 1:5.27.1-1~bpo10+1 (source) into buster-backports (Joseph Nahmias) (signed by: Joe Nahmias)
  • [2020-10-30] monit 1:5.27.1-1 MIGRATED to testing (Debian testing watch)
  • [2020-10-25] Accepted monit 1:5.27.1-1 (source) into unstable (Sergey B Kirpichev)
  • [2020-09-28] monit 1:5.27.0-2 MIGRATED to testing (Debian testing watch)
  • [2020-09-23] Accepted monit 1:5.27.0-2 (source) into unstable (Sergey B Kirpichev)
  • [2020-08-05] monit 1:5.27.0-1 MIGRATED to testing (Debian testing watch)
  • [2020-07-31] Accepted monit 1:5.27.0-1 (source) into unstable (Sergey B Kirpichev)
  • [2020-05-03] monit 1:5.26.0-6 MIGRATED to testing (Debian testing watch)
  • [2020-04-28] Accepted monit 1:5.26.0-6 (source) into unstable (Sergey B Kirpichev)
  • [2020-04-25] monit 1:5.26.0-5 MIGRATED to testing (Debian testing watch)
  • [2020-04-20] Accepted monit 1:5.26.0-5 (source) into unstable (Sergey B Kirpichev)
  • [2020-02-11] monit 1:5.26.0-4 MIGRATED to testing (Debian testing watch)
  • [2020-02-05] Accepted monit 1:5.26.0-4 (source) into unstable (Sergey B Kirpichev)
  • [2020-01-30] Accepted monit 1:5.20.0-6+deb9u1 (source) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates (Sergey B Kirpichev)
  • [2020-01-05] monit 1:5.26.0-3 MIGRATED to testing (Debian testing watch)
  • [2019-12-12] Accepted monit 1:5.26.0-3 (source) into unstable (Sergey B Kirpichev)
  • [2019-10-10] Accepted monit 1:5.26.0-2 (source amd64) into unstable (Sergey B Kirpichev)
  • [2019-07-17] Accepted monit 1:5.26.0-1~bpo10+1 (source amd64) into buster-backports, buster-backports (Sergey B Kirpichev) (signed by: Sebastiaan Couwenberg)
  • [2019-07-13] monit 1:5.26.0-1 MIGRATED to testing (Debian testing watch)
  • [2019-07-07] Accepted monit 1:5.26.0-1 (source) into unstable (Sergey B Kirpichev)
  • [2019-06-28] monit REMOVED from testing (Debian testing watch)
  • [2019-06-17] Accepted monit 1:5.25.2-3+deb10u1 (source amd64) into testing-proposed-updates (Sergey B Kirpichev)
  • [2019-06-03] Accepted monit 1:5.25.3-1 (source amd64) into unstable (Sergey B Kirpichev)
  • [2019-04-26] Accepted monit 1:5.9-1+deb8u2 (source amd64) into oldstable (Thorsten Alteholz)
  • [2019-02-27] monit 1:5.25.2-3 MIGRATED to testing (Debian testing watch)
  • [2019-02-17] Accepted monit 1:5.25.2-3 (source) into unstable (Sergey B Kirpichev)
  • [2018-12-26] monit 1:5.25.2-2 MIGRATED to testing (Debian testing watch)
  • [2018-12-21] Accepted monit 1:5.25.2-2 (source amd64) into unstable (Sergey B Kirpichev)
  • [2018-06-06] monit 1:5.25.2-1 MIGRATED to testing (Debian testing watch)
  • [2018-06-01] Accepted monit 1:5.25.2-1 (source amd64) into unstable (Sergey B Kirpichev)
  • 1
  • 2
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian
  • buildd: logs, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1:5.27.1-1
  • 12 bugs (2 patches)

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing