Categories
Partner News

Zabbix Update

This Zabbix Update annonces that Zabbix 5.4 is around the corner! Explore Zabbix 5.4.0alpha2 and feel free to download Zabbix 4.0.295.0.9, and 5.2.5 stable versions. Do you wish to learn how to Install Zabbix with Docker containers? Setup Prometheus monitoring, Install Zabbix with TimescaleDB? Join our Youtube community. It consists of over 10k Zabbix fans and learn how to utilize Zabbix to its fullest extent!
Join Zabbix Meetups
Zabbix Meetup Online English
Join us to listen to a few speeches on Zabbix & MySQL. Explore the use case on Zabbix usage by Finnish company Relex Solutions. Dive into the benefits Zabbix support brings. 
Sign up for the event on March 10
Zabbix Meetup Online English
The event will be technical-focused. The full agenda will be published soon — register to get updates.
Let’s meet on on March 24
All Upcoming Events
New Integrations Available
Zabbix + Apache Ignite
Apache Ignite is a distributed database for high-performance computing with in-memory speed. Explore the official JMX Template for the Apache Ignite computing platform. 
All Official Integrations

And a last topic of this Zabbix Update is about training … find here all available Zabbix trainings.


Categories
Partner News

Zabbix 5.4.0alpha1



We are pleased to announce that as of today of Zabbix 5.4.0alpha1 is available.

Zabbix is known for its enterprise-class open source distributed monitoring solution. They also release the software under the GPL. This means that it is free of charge for both commercial and non-commercial use. A complete text of the license is available at http://www.gnu.org/copyleft/gpl.txt.

This document contains the release notes for Zabbix 5.4.0alpha1. Download it from download.

Please click here to find all details.

Click here for our official Zabbix training.


Categories
Partner News

Red Hat Reports a Flow in Sudo



Description

Red Hat reports a flow in sudo. They found a heap-based buffer overflow in the way sudo parses command line arguments. This flaw is exploitable by any local user. Counts for normal users and system users, sudo-ers and non-sudo-ers, without authentication. Meaning: the attacker does not need to know the user’s password. Successful exploitation of this flaw could lead to privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Read here the complete article.