|
|
Subscribe / Log in / New account

Gentoo alert 201702-26 (nagios-core)

From:  Thomas Deutschmann <whissi@gentoo.org>
To:  gentoo-announce@lists.gentoo.org
Subject:  [gentoo-announce] [ GLSA 201702-26 ] Nagios: Multiple vulnerabilities
Date:  Tue, 21 Feb 2017 01:09:48 +0100
Message-ID:  <8e756965-cff4-e50b-e045-c05cb02aa43b@gentoo.org>

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201702-26 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: Nagios: Multiple vulnerabilities Date: February 21, 2017 Bugs: #595194, #598104, #600864, #602216 ID: 201702-26 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Nagios, the worst of which could lead to privilege escalation. Background ========== Nagios is an open source host, service and network monitoring program. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-analyzer/nagios-core < 4.2.4 >= 4.2.4 Description =========== Multiple vulnerabilities have been discovered in Nagios. Please review the CVE identifiers referenced below for details. Impact ====== A local attacker, who either is already Nagios's system user or belongs to Nagios's group, could potentially escalate privileges. In addition, a remote attacker could read or write to arbitrary files by spoofing a crafted response from the Nagios RSS feed server. Workaround ========== There is no known workaround at this time. Resolution ========== All Nagios users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-analyzer/nagios-core-4.2.4" References ========== [ 1 ] CVE-2008-4796 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4796 [ 2 ] CVE-2008-7313 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-7313 [ 3 ] CVE-2016-8641 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8641 [ 4 ] CVE-2016-9565 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9565 [ 5 ] CVE-2016-9566 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9566 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201702-26 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2017 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds