| From: |
| Mageia Updates <buildsystem-daemon@mageia.org> |
| To: |
| updates-announce@ml.mageia.org |
| Subject: |
| [updates-announce] MGASA-2013-0039: nagios-3.3.1-2.2.mga2 (2/core) |
| Date: |
| Fri, 8 Feb 2013 15:46:09 +0100 |
| Message-ID: |
| <20130208144609.GA3041@valstar.mageia.org> |
| Archive-link: |
| Article, Thread
|
MGASA-2013-0039
Date: February 8th, 2013
Affected releases: 2
Media: Core
Description:
Updated nagios packages fixes the following:
Nagios Core's history.cgi is vulnerable to a buffer overflow because it
used sprintf on user-supplied data that was not restricted in size
(CVE-2012-6096).
Due to various protections of the operating system (history.cgi is
compiled with SSP, FORTIFY_SOURCE is enabled, etc.) this is not
believed to be exploitable and would result in a denial of service
to the user sending the input to history.cgi.
Updated Packages:
i586:
nagios-3.3.1-2.2.mga2.i586.rpm
nagios-devel-3.3.1-2.2.mga2.i586.rpm
nagios-theme-default-3.3.1-2.2.mga2.noarch.rpm
nagios-www-3.3.1-2.2.mga2.i586.rpm
nagios-debug-3.3.1-2.2.mga2.i586.rpm
x86_64:
nagios-3.3.1-2.2.mga2.x86_64.rpm
nagios-devel-3.3.1-2.2.mga2.x86_64.rpm
nagios-theme-default-3.3.1-2.2.mga2.noarch.rpm
nagios-www-3.3.1-2.2.mga2.x86_64.rpm
nagios-debug-3.3.1-2.2.mga2.x86_64.rpm
SRPMS:
nagios-3.3.1-2.2.mga2.src.rpm
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6096
http://lists.fedoraproject.org/pipermail/package-announce...
https://bugs.mageia.org/show_bug.cgi?id=8799
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-...
(
Log in to post comments)