Security update for nagios

This update for nagios fixes the following issues:

- new nagios-exec-start-post script to fix boo#1003362

- fix nagios_upgrade.sh writing to log file in user controlled
directory (boo#1182398). The nagios_upgrade.sh script writes the
logfile directly below /var/log/

nagios was updated to 4.4.6:

* Fixed Map display in Internet Explorer 11 (#714)
* Fixed duplicate properties appearing in statusjson.cgi (#718)
* Fixed NERD not building when enabled in ./configure (#723)
* Fixed build process when using GCC 10 (#721)
* Fixed postauth vulnerabilities in histogram.js, map.js, trends.js
(CVE-2020-13977, boo#1172794)
* When using systemd, configuration will be verified before
reloading (#715)
* Fixed HARD OK states triggering on the maximum check attempt (#757)

* Fix for CVE-2016-6209 (boo#989759) - The "corewindow" parameter (as in bringing this to our attention go to Dawid Golunski (boo#1014637)

Fixed bugs
bnc#1003362
server:monitoring/nagios: Bug
bnc#989759
VUL-1: CVE-2016-6209: nagios: Reflected XSS vulnerability and possible phishing vector
bnc#1014637
VUL-0: CVE-2016-9566: nagios,icinga: Privilege escalation issue
bnc#1172794
VUL-1: CVE-2020-13977: nagios: an attacker, who already has administrative access to change the "URL for JSON CGIs" configuration, can modify the Alert Histogram and Trends code
Selected Binaries
openSUSE Build Service is sponsored by