A new version of the agent has been released. Follow standard procedures to update the Infrastructure agent. New Relic recommends that you upgrade the agent regularly and at a minimum every 3 months. As of this release, the oldest supported version is Infrastructure agent 1.58.1.
Changed
- Updated the Go version to 1.25.7
Security
- Addresses vulnerabilities
A new version of the agent has been released. Follow standard procedures to update the Infrastructure agent. New Relic recommends that you upgrade the agent regularly and at a minimum every 3 months. As of this release, the oldest supported version is Infrastructure agent 1.58.1.
Changed
- Updated dependency newrelic/nri-prometheus to v2.27.6 in #2177
- Updated dependency newrelic/nri-flex to v1.17.3 in #2180
- Updated dependency newrelic/nri-winservices to v1.4.2 in #2181
- Updated dependency newrelic/nri-docker to v2.6.7 in #2182
- Updated the go version to 1.25.6 in #2183
Security
- Addressed High Vulnerabilities CVE-2025-61726 and CVE-2025-61728
A new version of the agent has been released. Follow standard procedures to update the Infrastructure agent. New Relic recommends that you upgrade the agent regularly and at a minimum every 3 months. As of this release, the oldest supported version is Infrastructure agent 1.58.1.
Added
- Added support for RHEL10 in #2169
Changed
- Updated newrelic_plugin_version in #2170
Uma nova versão do agente foi lançada. Siga os procedimentos padrão para atualizar o agente de infraestrutura. A New Relic recomenda que você atualize o agente regularmente e, no mínimo, a cada 3 meses. Até o momento desta versão, a versão mais antiga suportada é o agente de infraestrutura 1.58.1.
Adicionado
- Adicionada a opção de configuração
logging_http_client_timeoutpara controlar o tempo limite do cliente HTTP (em segundos) para o plugin de saída fluent-bit do New Relic em #2167 - Adicionado o esquema de upload para RHEL10 em #2171
Mudado
- Definir a flag
win_network_interface_v2como verdadeira (true) por padrão em #2173 - Versão mínima atualizada para pkg-tests em #2172
Segurança
- Abordada a vulnerabilidade crítica - CVE-2025-15467 e a vulnerabilidade alta - CVE-2025-69419
Uma nova versão do agente foi lançada. Siga os procedimentos padrão para atualizar o agente de infraestrutura. A New Relic recomenda que você atualize o agente regularmente e, no mínimo, a cada 3 meses. Até o momento desta versão, a versão mais antiga suportada é o agente de infraestrutura 1.58.1.
Fixo
Corrigido
transmitBytesPerSecondmostrando zero durante alto tráfego no Windows (NR-502872) em #2166重要
Para habilitar essa correção, você deve definir a opção de configuração
win_network_interface_v2comotrue. Esta opção usa contadores de 64 bits em vez de contadores de 32 bits para métricas de rede no Windows.
Uma nova versão do agente foi lançada. Siga os procedimentos padrão para atualizar o agente de infraestrutura. A New Relic recomenda que você atualize o agente regularmente e, no mínimo, a cada 3 meses. Até o momento desta versão, a versão mais antiga suportada é o agente de infraestrutura 1.58.1.
Mudado
A new version of the agent has been released. Follow standard procedures to update the Infrastructure agent. New Relic recommends that you upgrade the agent regularly and at a minimum every 3 months. As of this release, the oldest supported version is Infrastructure agent 1.51.0.
Security
A new version of the Fluent Bit version has been released with a fix for CVE-2025-12972, CVE-2025-12970,CVE-2025-12978,CVE-2025-12977,CVE-2025-12969 . Fluent Bit versions earlier than v4.0.13 series are affected by security vulnerabilities. The specific plugins and their associated vulnerabilities are following:
- Forward input plugin (in_forward) - Affected by CVE-2025-12969
- Docker input plugin (in_docker) - Affected by CVE-2025-12970
- File output plugin (out_file) - Affected by CVE-2025-12972
- HTTP, Splunk, and Elasticsearch input plugins (in_http, in_splunk, in_elasticsearch) - Affected by CVE-2025-12978 & CVE-2025-12977
Notes:
- There is no secure FluentBit upstream package available for Ubuntu 16, 18, and 20. If you are running on any of these distributions, make sure you remove the affected input plugins to protect from vulnerabilities.
- We are working to provide secure packages for SLES 12.5 and 15.4 as soon as possible. Until we roll out the safe packages for these distributions, we recommend removing the affected plugins to protect from vulnerabilities.
- We are working to provide a secure package for Debian 10 as soon as possible. Until we roll out a safe package for this distribution, we recommend removing the affected plugins to protect from vulnerabilities.