A new version of the agent has been released. Follow standard procedures to update the Infrastructure agent. New Relic recommends that you upgrade the agent regularly and at a minimum every 3 months. As of this release, the oldest supported version is Infrastructure agent 1.58.1.
Changed
- Updated the Go version to 1.25.7
Security
- Addresses vulnerabilities
A new version of the agent has been released. Follow standard procedures to update the Infrastructure agent. New Relic recommends that you upgrade the agent regularly and at a minimum every 3 months. As of this release, the oldest supported version is Infrastructure agent 1.58.1.
Changed
- Updated dependency newrelic/nri-prometheus to v2.27.6 in #2177
- Updated dependency newrelic/nri-flex to v1.17.3 in #2180
- Updated dependency newrelic/nri-winservices to v1.4.2 in #2181
- Updated dependency newrelic/nri-docker to v2.6.7 in #2182
- Updated the go version to 1.25.6 in #2183
Security
- Addressed High Vulnerabilities CVE-2025-61726 and CVE-2025-61728
A new version of the agent has been released. Follow standard procedures to update the Infrastructure agent. New Relic recommends that you upgrade the agent regularly and at a minimum every 3 months. As of this release, the oldest supported version is Infrastructure agent 1.58.1.
Added
- Added support for RHEL10 in #2169
Changed
- Updated newrelic_plugin_version in #2170
Se lanzó una nueva versión del agente. Siga los procedimientos estándar para actualizar el agente de infraestructura. New Relic recomienda que actualices el agente periódicamente y como mínimo cada 3 meses. A partir de esta versión, la versión compatible más antigua es agente de infraestructura 1.58.1.
Agregado
- Se agregó la opción de configuración
logging_http_client_timeoutpara controlar el tiempo de espera del cliente HTTP (en segundos) para el plugin de salida fluent-bit de New Relic en #2167 - Se agregó el esquema de carga para RHEL10 en #2171
Cambió
- Establecer la bandera
win_network_interface_v2como verdadera (true) de forma predeterminada en #2173 - Se actualizó la versión mínima para las pruebas de paquetes (pkg-tests) en #2172
Seguridad
- Se abordó la vulnerabilidad crítica - CVE-2025-15467 y la vulnerabilidad alta - CVE-2025-69419
Se lanzó una nueva versión del agente. Siga los procedimientos estándar para actualizar el agente de infraestructura. New Relic recomienda que actualices el agente periódicamente y como mínimo cada 3 meses. A partir de esta versión, la versión compatible más antigua es agente de infraestructura 1.58.1.
Fijado
Solucionado
transmitBytesPerSecondque mostraba cero durante el tráfico alto en Windows (NR-502872) en #2166Important
Para habilitar esta solución, debe establecer la opción de configuración
win_network_interface_v2entrue. Esta opción utiliza contadores de 64 bits en lugar de contadores de 32 bits para las métricas de red en Windows.
Se lanzó una nueva versión del agente. Siga los procedimientos estándar para actualizar el agente de infraestructura. New Relic recomienda que actualices el agente periódicamente y como mínimo cada 3 meses. A partir de esta versión, la versión compatible más antigua es agente de infraestructura 1.58.1.
Cambió
- Etiqueta docker Alpine actualizada a la versión 3.23 en el n.° 2158
- Versión de Go actualizada a 1.25.5 en #2161
A new version of the agent has been released. Follow standard procedures to update the Infrastructure agent. New Relic recommends that you upgrade the agent regularly and at a minimum every 3 months. As of this release, the oldest supported version is Infrastructure agent 1.51.0.
Security
A new version of the Fluent Bit version has been released with a fix for CVE-2025-12972, CVE-2025-12970,CVE-2025-12978,CVE-2025-12977,CVE-2025-12969 . Fluent Bit versions earlier than v4.0.13 series are affected by security vulnerabilities. The specific plugins and their associated vulnerabilities are following:
- Forward input plugin (in_forward) - Affected by CVE-2025-12969
- Docker input plugin (in_docker) - Affected by CVE-2025-12970
- File output plugin (out_file) - Affected by CVE-2025-12972
- HTTP, Splunk, and Elasticsearch input plugins (in_http, in_splunk, in_elasticsearch) - Affected by CVE-2025-12978 & CVE-2025-12977
Notes:
- There is no secure FluentBit upstream package available for Ubuntu 16, 18, and 20. If you are running on any of these distributions, make sure you remove the affected input plugins to protect from vulnerabilities.
- We are working to provide secure packages for SLES 12.5 and 15.4 as soon as possible. Until we roll out the safe packages for these distributions, we recommend removing the affected plugins to protect from vulnerabilities.
- We are working to provide a secure package for Debian 10 as soon as possible. Until we roll out a safe package for this distribution, we recommend removing the affected plugins to protect from vulnerabilities.