LWN.net Logo

Mageia alert MGASA-2013-0039 (nagios)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2013-0039: nagios-3.3.1-2.2.mga2 (2/core)
Date:  Fri, 8 Feb 2013 15:46:09 +0100
Message-ID:  <20130208144609.GA3041@valstar.mageia.org>
Archive-link:  Article, Thread

MGASA-2013-0039 Date: February 8th, 2013 Affected releases: 2 Media: Core Description: Updated nagios packages fixes the following: Nagios Core's history.cgi is vulnerable to a buffer overflow because it used sprintf on user-supplied data that was not restricted in size (CVE-2012-6096). Due to various protections of the operating system (history.cgi is compiled with SSP, FORTIFY_SOURCE is enabled, etc.) this is not believed to be exploitable and would result in a denial of service to the user sending the input to history.cgi. Updated Packages: i586: nagios-3.3.1-2.2.mga2.i586.rpm nagios-devel-3.3.1-2.2.mga2.i586.rpm nagios-theme-default-3.3.1-2.2.mga2.noarch.rpm nagios-www-3.3.1-2.2.mga2.i586.rpm nagios-debug-3.3.1-2.2.mga2.i586.rpm x86_64: nagios-3.3.1-2.2.mga2.x86_64.rpm nagios-devel-3.3.1-2.2.mga2.x86_64.rpm nagios-theme-default-3.3.1-2.2.mga2.noarch.rpm nagios-www-3.3.1-2.2.mga2.x86_64.rpm nagios-debug-3.3.1-2.2.mga2.x86_64.rpm SRPMS: nagios-3.3.1-2.2.mga2.src.rpm References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6096 http://lists.fedoraproject.org/pipermail/package-announce... https://bugs.mageia.org/show_bug.cgi?id=8799 https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-...


(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds