ALT-BU-2019-3860-1
Branch c8.1 update bulletin.
Package kernel-image-std-4.9 updated to version 4.9.188-alt0.M80C.1 for branch c8.1 in task 235630.
Closed vulnerabilities
BDU:2019-03627
Уязвимость ядра операционной системы Linux, связанная с ошибкой управления ресурсами, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04744
Уязвимость драйверов drivers/bluetooth/hci_ath.c, drivers/bluetooth/hci_bcm.c, drivers/bluetooth/hci_intel.c, drivers/bluetooth/hci_ldisc.c, drivers/bluetooth/hci_mrvl.c, drivers/bluetooth/hci_qca.c, drivers/bluetooth/hci_uart.h для UART-подключаемых адаптеров Bluetooth ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-10207
A flaw was found in the Linux kernel's Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.
Modified: 2024-11-21
CVE-2019-13648
In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c.
- openSUSE-SU-2019:1924
- openSUSE-SU-2019:1924
- openSUSE-SU-2019:1923
- openSUSE-SU-2019:1923
- http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- [oss-security] 20190730 CVE-2019-13648: Linux kernel: powerpc: kernel crash in TM handling triggerable by any local user
- [oss-security] 20190730 CVE-2019-13648: Linux kernel: powerpc: kernel crash in TM handling triggerable by any local user
- https://git.kernel.org/torvalds/c/f16d80b75a096c52354c6e0a574993f3b0dfbdfe
- https://git.kernel.org/torvalds/c/f16d80b75a096c52354c6e0a574993f3b0dfbdfe
- [debian-lts-announce] 20190814 [SECURITY] [DLA 1885-1] linux-4.9 security update
- [debian-lts-announce] 20190814 [SECURITY] [DLA 1885-1] linux-4.9 security update
- FEDORA-2019-7aecfe1c4b
- FEDORA-2019-7aecfe1c4b
- https://patchwork.ozlabs.org/patch/1133904/
- https://patchwork.ozlabs.org/patch/1133904/
- 20190812 [SECURITY] [DSA 4495-1] linux security update
- 20190812 [SECURITY] [DSA 4495-1] linux security update
- 20190813 [SECURITY] [DSA 4497-1] linux security update
- 20190813 [SECURITY] [DSA 4497-1] linux security update
- 20190814 [slackware-security] Slackware 14.2 kernel (SSA:2019-226-01)
- 20190814 [slackware-security] Slackware 14.2 kernel (SSA:2019-226-01)
- https://security.netapp.com/advisory/ntap-20190806-0001/
- https://security.netapp.com/advisory/ntap-20190806-0001/
- USN-4114-1
- USN-4114-1
- USN-4115-1
- USN-4115-1
- USN-4116-1
- USN-4116-1
- DSA-4495
- DSA-4495
- DSA-4497
- DSA-4497
Closed vulnerabilities
BDU:2019-01412
Уязвимость функции ldb_wildcard_compare компонента LDAP пакета программ сетевого взаимодействия Samba, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00694
Уязвимость компонента LDAP-сервера программ сетевого взаимодействия Samba, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-1140
A missing input sanitization flaw was found in the implementation of LDP database used for the LDAP server. An attacker could use this flaw to cause a denial of service against a samba server, used as a Active Directory Domain Controller. All versions of Samba from 4.8.0 onwards are vulnerable
- 105082
- 105082
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1140
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1140
- https://bugzilla.samba.org/show_bug.cgi?id=13374
- https://bugzilla.samba.org/show_bug.cgi?id=13374
- GLSA-202003-52
- GLSA-202003-52
- https://security.netapp.com/advisory/ntap-20180814-0001/
- https://security.netapp.com/advisory/ntap-20180814-0001/
- https://www.samba.org/samba/security/CVE-2018-1140.html
- https://www.samba.org/samba/security/CVE-2018-1140.html
Modified: 2024-11-21
CVE-2019-3824
A flaw was found in the way an LDAP search expression could crash the shared LDAP server process of a samba AD DC in samba before version 4.10. An authenticated user, having read permissions on the LDAP server, could use this flaw to cause denial of service.
- openSUSE-SU-2019:1163
- openSUSE-SU-2019:1163
- 107347
- 107347
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3824
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3824
- https://bugzilla.samba.org/show_bug.cgi?id=13773
- https://bugzilla.samba.org/show_bug.cgi?id=13773
- [debian-lts-announce] 20190301 [SECURITY] [DLA 1699-1] ldb security update
- [debian-lts-announce] 20190301 [SECURITY] [DLA 1699-1] ldb security update
- https://security.netapp.com/advisory/ntap-20190226-0001/
- https://security.netapp.com/advisory/ntap-20190226-0001/
- USN-3895-1
- USN-3895-1
- DSA-4397
- DSA-4397
Closed vulnerabilities
BDU:2019-01870
Уязвимость реализации Heimdal протокола Kerberos пакета программ сетевого взаимодействия Samba, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
BDU:2020-00695
Уязвимость компонента обработки зоны DNS на сервере программ сетевого взаимодействия Samba, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00697
Уязвимость конфигурации AD DC программ сетевого взаимодействия Samba, позволяющая нарушителю оказать воздействие на целостность информации
BDU:2020-00724
Уязвимость программного обеспечения Samba, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00765
Уязвимость пакета программ Samba, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю оказать воздействие на целостность и конфиденциальность данных
Modified: 2024-11-21
CVE-2018-16852
Samba from version 4.9.0 and before version 4.9.3 is vulnerable to a NULL pointer de-reference. During the processing of an DNS zone in the DNS management DCE/RPC server, the internal DNS server or the Samba DLZ plugin for BIND9, if the DSPROPERTY_ZONE_MASTER_SERVERS property or DSPROPERTY_ZONE_SCAVENGING_SERVERS property is set, the server will follow a NULL pointer and terminate. There is no further vulnerability associated with this issue, merely a denial of service.
- 106024
- 106024
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16852
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16852
- GLSA-202003-52
- GLSA-202003-52
- https://security.netapp.com/advisory/ntap-20181127-0001/
- https://security.netapp.com/advisory/ntap-20181127-0001/
- https://www.samba.org/samba/security/CVE-2018-16852.html
- https://www.samba.org/samba/security/CVE-2018-16852.html
Modified: 2024-11-21
CVE-2018-16857
Samba from version 4.9.0 and before version 4.9.3 that have AD DC configurations watching for bad passwords (to restrict brute forcing of passwords) in a window of more than 3 minutes may not watch for bad passwords at all. The primary risk from this issue is with regards to domains that have been upgraded from Samba 4.8 and earlier. In these cases the manual testing done to confirm an organisation's password policies apply as expected may not have been re-done after the upgrade.
- 106024
- 106024
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16857
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16857
- GLSA-202003-52
- GLSA-202003-52
- https://security.netapp.com/advisory/ntap-20181127-0001/
- https://security.netapp.com/advisory/ntap-20181127-0001/
- https://www.samba.org/samba/security/CVE-2018-16857.html
- https://www.samba.org/samba/security/CVE-2018-16857.html
Modified: 2024-11-21
CVE-2018-16860
A flaw was found in samba's Heimdal KDC implementation, versions 4.8.x up to, excluding 4.8.12, 4.9.x up to, excluding 4.9.8 and 4.10.x up to, excluding 4.10.3, when used in AD DC mode. A man in the middle attacker could use this flaw to intercept the request to the KDC and replace the user name (principal) in the request with any desired user name (principal) that exists in the KDC effectively obtaining a ticket for that principal.
- openSUSE-SU-2019:1888
- openSUSE-SU-2019:1888
- 20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra
- 20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra
- 20190816 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4
- 20190816 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4
- 20190816 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3
- 20190816 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3
- 20190816 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4
- 20190816 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16860
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16860
- 20190814 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra
- 20190814 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra
- 20190814 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3
- 20190814 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3
- 20190814 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4
- 20190814 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4
- 20190814 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4
- 20190814 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4
- GLSA-202003-52
- GLSA-202003-52
- https://support.apple.com/HT210346
- https://support.apple.com/HT210346
- https://support.apple.com/HT210348
- https://support.apple.com/HT210348
- https://support.apple.com/HT210351
- https://support.apple.com/HT210351
- https://support.apple.com/HT210353
- https://support.apple.com/HT210353
- https://www.samba.org/samba/security/CVE-2018-16860.html
- https://www.samba.org/samba/security/CVE-2018-16860.html
- https://www.synology.com/security/advisory/Synology_SA_19_23
- https://www.synology.com/security/advisory/Synology_SA_19_23
Modified: 2024-11-21
CVE-2019-12435
Samba 4.9.x before 4.9.9 and 4.10.x before 4.10.5 has a NULL pointer dereference, leading to Denial of Service. This is related to the AD DC DNS management server (dnsserver) RPC server process.
- openSUSE-SU-2019:1755
- openSUSE-SU-2019:1755
- 108825
- 108825
- FEDORA-2019-8966706e33
- FEDORA-2019-8966706e33
- FEDORA-2019-8015e5dc40
- FEDORA-2019-8015e5dc40
- USN-4018-1
- USN-4018-1
- https://www.samba.org/samba/security/CVE-2019-12435.html
- https://www.samba.org/samba/security/CVE-2019-12435.html
- https://www.synology.com/security/advisory/Synology_SA_19_27
- https://www.synology.com/security/advisory/Synology_SA_19_27
Modified: 2024-11-21
CVE-2019-3880
A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable.
- https://access.redhat.com/security/cve/cve-2019-3880
- openSUSE-SU-2019:1180
- openSUSE-SU-2019:1180
- openSUSE-SU-2019:1292
- openSUSE-SU-2019:1292
- RHSA-2019:1966
- RHSA-2019:1966
- RHSA-2019:1967
- RHSA-2019:1967
- RHSA-2019:2099
- RHSA-2019:2099
- RHSA-2019:3582
- RHSA-2019:3582
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3880
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3880
- [debian-lts-announce] 20190409 [SECURITY] [DLA 1754-1] samba security update
- [debian-lts-announce] 20190409 [SECURITY] [DLA 1754-1] samba security update
- FEDORA-2019-db21b5f1d2
- FEDORA-2019-db21b5f1d2
- FEDORA-2019-019c5314a0
- FEDORA-2019-019c5314a0
- FEDORA-2019-cacf88eabf
- FEDORA-2019-cacf88eabf
- https://security.netapp.com/advisory/ntap-20190411-0004/
- https://security.netapp.com/advisory/ntap-20190411-0004/
- https://support.f5.com/csp/article/K20804356
- https://support.f5.com/csp/article/K20804356
- https://www.samba.org/samba/security/CVE-2019-3880.html
- https://www.samba.org/samba/security/CVE-2019-3880.html
- https://www.synology.com/security/advisory/Synology_SA_19_15
- https://www.synology.com/security/advisory/Synology_SA_19_15
Closed vulnerabilities
BDU:2019-01870
Уязвимость реализации Heimdal протокола Kerberos пакета программ сетевого взаимодействия Samba, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
BDU:2020-00695
Уязвимость компонента обработки зоны DNS на сервере программ сетевого взаимодействия Samba, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00697
Уязвимость конфигурации AD DC программ сетевого взаимодействия Samba, позволяющая нарушителю оказать воздействие на целостность информации
BDU:2020-00724
Уязвимость программного обеспечения Samba, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-16852
Samba from version 4.9.0 and before version 4.9.3 is vulnerable to a NULL pointer de-reference. During the processing of an DNS zone in the DNS management DCE/RPC server, the internal DNS server or the Samba DLZ plugin for BIND9, if the DSPROPERTY_ZONE_MASTER_SERVERS property or DSPROPERTY_ZONE_SCAVENGING_SERVERS property is set, the server will follow a NULL pointer and terminate. There is no further vulnerability associated with this issue, merely a denial of service.
- 106024
- 106024
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16852
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16852
- GLSA-202003-52
- GLSA-202003-52
- https://security.netapp.com/advisory/ntap-20181127-0001/
- https://security.netapp.com/advisory/ntap-20181127-0001/
- https://www.samba.org/samba/security/CVE-2018-16852.html
- https://www.samba.org/samba/security/CVE-2018-16852.html
Modified: 2024-11-21
CVE-2018-16857
Samba from version 4.9.0 and before version 4.9.3 that have AD DC configurations watching for bad passwords (to restrict brute forcing of passwords) in a window of more than 3 minutes may not watch for bad passwords at all. The primary risk from this issue is with regards to domains that have been upgraded from Samba 4.8 and earlier. In these cases the manual testing done to confirm an organisation's password policies apply as expected may not have been re-done after the upgrade.
- 106024
- 106024
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16857
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16857
- GLSA-202003-52
- GLSA-202003-52
- https://security.netapp.com/advisory/ntap-20181127-0001/
- https://security.netapp.com/advisory/ntap-20181127-0001/
- https://www.samba.org/samba/security/CVE-2018-16857.html
- https://www.samba.org/samba/security/CVE-2018-16857.html
Modified: 2024-11-21
CVE-2018-16860
A flaw was found in samba's Heimdal KDC implementation, versions 4.8.x up to, excluding 4.8.12, 4.9.x up to, excluding 4.9.8 and 4.10.x up to, excluding 4.10.3, when used in AD DC mode. A man in the middle attacker could use this flaw to intercept the request to the KDC and replace the user name (principal) in the request with any desired user name (principal) that exists in the KDC effectively obtaining a ticket for that principal.
- openSUSE-SU-2019:1888
- openSUSE-SU-2019:1888
- 20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra
- 20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra
- 20190816 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4
- 20190816 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4
- 20190816 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3
- 20190816 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3
- 20190816 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4
- 20190816 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16860
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16860
- 20190814 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra
- 20190814 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra
- 20190814 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3
- 20190814 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3
- 20190814 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4
- 20190814 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4
- 20190814 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4
- 20190814 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4
- GLSA-202003-52
- GLSA-202003-52
- https://support.apple.com/HT210346
- https://support.apple.com/HT210346
- https://support.apple.com/HT210348
- https://support.apple.com/HT210348
- https://support.apple.com/HT210351
- https://support.apple.com/HT210351
- https://support.apple.com/HT210353
- https://support.apple.com/HT210353
- https://www.samba.org/samba/security/CVE-2018-16860.html
- https://www.samba.org/samba/security/CVE-2018-16860.html
- https://www.synology.com/security/advisory/Synology_SA_19_23
- https://www.synology.com/security/advisory/Synology_SA_19_23
Modified: 2024-11-21
CVE-2019-12435
Samba 4.9.x before 4.9.9 and 4.10.x before 4.10.5 has a NULL pointer dereference, leading to Denial of Service. This is related to the AD DC DNS management server (dnsserver) RPC server process.
- openSUSE-SU-2019:1755
- openSUSE-SU-2019:1755
- 108825
- 108825
- FEDORA-2019-8966706e33
- FEDORA-2019-8966706e33
- FEDORA-2019-8015e5dc40
- FEDORA-2019-8015e5dc40
- USN-4018-1
- USN-4018-1
- https://www.samba.org/samba/security/CVE-2019-12435.html
- https://www.samba.org/samba/security/CVE-2019-12435.html
- https://www.synology.com/security/advisory/Synology_SA_19_27
- https://www.synology.com/security/advisory/Synology_SA_19_27
Closed bugs
Нестабильное поведение sssd-kcm
Package nagios-nrpe updated to version 3.2.1-alt2.M80C.2 for branch c8.1 in task 235730.
Closed vulnerabilities
BDU:2019-01845
Уязвимость утилиты удалённого выполнения плагинов Nagios Remote Plugin Executor, связанная с недостаточной проверкой входных данных, позволяющая нарушителю выполнить произвольный код
BDU:2019-01845
Уязвимость утилиты удалённого выполнения плагинов Nagios Remote Plugin Executor, связанная с недостаточной проверкой входных данных, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2014-2913
Incomplete blacklist vulnerability in nrpe.c in Nagios Remote Plugin Executor (NRPE) 2.15 and earlier allows remote attackers to execute arbitrary commands via a newline character in the -a option to libexec/check_nrpe. NOTE: this issue is disputed by multiple parties. It has been reported that the vendor allows newlines as "expected behavior." Also, this issue can only occur when the administrator enables the "dont_blame_nrpe" option in nrpe.conf despite the "HIGH security risk" warning within the comments
- FEDORA-2015-15398
- FEDORA-2015-15398
- SUSE-SU-2014:0682
- SUSE-SU-2014:0682
- openSUSE-SU-2014:0594
- openSUSE-SU-2014:0594
- openSUSE-SU-2014:0603
- openSUSE-SU-2014:0603
- 20140417 NRPE - Nagios Remote Plugin Executor <= 2.15 Remote Command Execution
- 20140417 NRPE - Nagios Remote Plugin Executor <= 2.15 Remote Command Execution
- 20140418 Re: NRPE - Nagios Remote Plugin Executor <= 2.15 Remote Command Execution
- 20140418 Re: NRPE - Nagios Remote Plugin Executor <= 2.15 Remote Command Execution
- [oss-security] 20140422 Re: CVE Request: Nagios Remote Plugin Executor <= 2.15 Remote Command Execution
- [oss-security] 20140422 Re: CVE Request: Nagios Remote Plugin Executor <= 2.15 Remote Command Execution
- [oss-security] 20140422 Re: CVE Request: Nagios Remote Plugin Executor <= 2.15 Remote Command Execution
- [oss-security] 20140422 Re: CVE Request: Nagios Remote Plugin Executor <= 2.15 Remote Command Execution
- 66969
- 66969
Closed bugs
В пакете идёт устаревший конфиг, не позволяющий настроить SSL