File _patchinfo of Package patchinfo.16268
<patchinfo incident="16268"> <issue tracker="bnc" id="1182398"></issue> <issue tracker="bnc" id="1003362">server:monitoring/nagios: Bug</issue> <issue tracker="bnc" id="989759">VUL-1: CVE-2016-6209: nagios: Reflected XSS vulnerability and possible phishing vector</issue> <issue tracker="bnc" id="1014637">VUL-0: CVE-2016-9566: nagios,icinga: Privilege escalation issue</issue> <issue tracker="bnc" id="1172794">VUL-1: CVE-2020-13977: nagios: an attacker, who already has administrative access to change the "URL for JSON CGIs" configuration, can modify the Alert Histogram and Trends code</issue> <issue tracker="cve" id="2020-13977"/> <issue tracker="cve" id="2016-6209"/> <packager>lrupp</packager> <rating>important</rating> <category>security</category> <summary>Security update for nagios</summary> <description>This update for nagios fixes the following issues: - new nagios-exec-start-post script to fix boo#1003362 - fix nagios_upgrade.sh writing to log file in user controlled directory (boo#1182398). The nagios_upgrade.sh script writes the logfile directly below /var/log/ nagios was updated to 4.4.6: * Fixed Map display in Internet Explorer 11 (#714) * Fixed duplicate properties appearing in statusjson.cgi (#718) * Fixed NERD not building when enabled in ./configure (#723) * Fixed build process when using GCC 10 (#721) * Fixed postauth vulnerabilities in histogram.js, map.js, trends.js (CVE-2020-13977, boo#1172794) * When using systemd, configuration will be verified before reloading (#715) * Fixed HARD OK states triggering on the maximum check attempt (#757) * Fix for CVE-2016-6209 (boo#989759) - The "corewindow" parameter (as in bringing this to our attention go to Dawid Golunski (boo#1014637) This update was imported from the openSUSE:Leap:15.2:Update update project.</description> </patchinfo>