File _patchinfo of Package patchinfo.16258

<patchinfo incident="16258">
  <issue tracker="bnc" id="1182398"></issue>
  <issue tracker="bnc" id="1003362">server:monitoring/nagios: Bug</issue>
  <issue tracker="bnc" id="989759">VUL-1: CVE-2016-6209: nagios: Reflected XSS vulnerability and possible phishing vector</issue>
  <issue tracker="bnc" id="1014637">VUL-0: CVE-2016-9566: nagios,icinga: Privilege escalation issue</issue>
  <issue tracker="bnc" id="1172794">VUL-1: CVE-2020-13977: nagios: an attacker, who already has administrative access to change the "URL for JSON CGIs" configuration, can modify the Alert Histogram and Trends code</issue>
  <issue tracker="cve" id="2020-13977"/>
  <issue tracker="cve" id="2016-6209"/>
  <packager>lrupp</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for nagios</summary>
  <description>This update for nagios fixes the following issues:

- new nagios-exec-start-post script to fix boo#1003362

- fix nagios_upgrade.sh writing to log file in user controlled 
  directory (boo#1182398). The nagios_upgrade.sh script writes the 
  logfile directly below /var/log/ 

nagios was updated to 4.4.6:

* Fixed Map display in Internet Explorer 11 (#714)
* Fixed duplicate properties appearing in statusjson.cgi (#718)
* Fixed NERD not building when enabled in ./configure (#723)
* Fixed build process when using GCC 10 (#721)
* Fixed postauth vulnerabilities in histogram.js, map.js, trends.js 
  (CVE-2020-13977, boo#1172794)
* When using systemd, configuration will be verified before
  reloading (#715)
* Fixed HARD OK states triggering on the maximum check attempt (#757)

* Fix for CVE-2016-6209 (boo#989759) - The "corewindow" parameter (as in bringing this to our attention go to Dawid Golunski (boo#1014637)
</description>
</patchinfo>
openSUSE Build Service is sponsored by