There exists security vulnerabilites in the monit HTTP interface,
which could allow an attacker in the worst case to gain root access
to the system. This issue only affect monit if monit is started
with http server support.
From: Robert Nagy <thuglife at bsd dot hu>
No response from MAINTAINER.
--
Main changes:
* Monit now reloads configuration ONLY after it receives SIGHUP.
Automatic reload based on monit's control file timestamp is now
defunct.
* New monit command 'reload' is added. If used, it will reinitialize
a running monit daemon (send it the SIGHUP signal).
* A new monit option '-t' is added. If used, monit will run a syntax
check for the control file and exit with the status.
* The ssl version for TCPSSL tests can now explicitly be set if auto-
detection should fail. (Thanks to Mark Foster for
the bugreport)
* Added support for LDAPv2 and LDAPv3, and DWP.
* Restart method added to monit httpd cervlet
* Alert messages in passive mode fixed
* Console command "monit restart [service]" in daemon mode fixed
* Start/stop/restart race condition fixed.
Changelog: http://www.tildeslash.com/monit/changes.html
Patches OpenBSD specific submitted to authors.
--
This release optionally makes use of OpenSSL, it is now
possible to monitor processes forged with SSL. It is also
possible to run monit's HTTP server with SSL.
Also added:
Timestamp monitoring for files and directories and an SSH
protocol test.
brad@ ok
--
monit is an utility for monitoring and managing daemons
or similar programs running on a Unix system.
It will start specified programs if they are not running
and restart programs not responding.
It supports MD5 checksums, alert notifications, an http
interface among other useful features.
brad@ ok