File _patchinfo of Package patchinfo.16258
<patchinfo incident="16258">
<issue tracker="bnc" id="1182398"></issue>
<issue tracker="bnc" id="1003362">server:monitoring/nagios: Bug</issue>
<issue tracker="bnc" id="989759">VUL-1: CVE-2016-6209: nagios: Reflected XSS vulnerability and possible phishing vector</issue>
<issue tracker="bnc" id="1014637">VUL-0: CVE-2016-9566: nagios,icinga: Privilege escalation issue</issue>
<issue tracker="bnc" id="1172794">VUL-1: CVE-2020-13977: nagios: an attacker, who already has administrative access to change the "URL for JSON CGIs" configuration, can modify the Alert Histogram and Trends code</issue>
<issue tracker="cve" id="2020-13977"/>
<issue tracker="cve" id="2016-6209"/>
<packager>lrupp</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for nagios</summary>
<description>This update for nagios fixes the following issues:
- new nagios-exec-start-post script to fix boo#1003362
- fix nagios_upgrade.sh writing to log file in user controlled
directory (boo#1182398). The nagios_upgrade.sh script writes the
logfile directly below /var/log/
nagios was updated to 4.4.6:
* Fixed Map display in Internet Explorer 11 (#714)
* Fixed duplicate properties appearing in statusjson.cgi (#718)
* Fixed NERD not building when enabled in ./configure (#723)
* Fixed build process when using GCC 10 (#721)
* Fixed postauth vulnerabilities in histogram.js, map.js, trends.js
(CVE-2020-13977, boo#1172794)
* When using systemd, configuration will be verified before
reloading (#715)
* Fixed HARD OK states triggering on the maximum check attempt (#757)
* Fix for CVE-2016-6209 (boo#989759) - The "corewindow" parameter (as in bringing this to our attention go to Dawid Golunski (boo#1014637)
</description>
</patchinfo>