ALT-BU-2021-3720-1
Branch p9 update bulletin.
Closed vulnerabilities
BDU:2015-03479
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2014-1878
Stack-based buffer overflow in the cmd_submitf function in cgi/cmd.c in Nagios Core, possibly 4.0.3rc1 and earlier, and Icinga before 1.8.6, 1.9 before 1.9.5, and 1.10 before 1.10.3 allows remote attackers to cause a denial of service (segmentation fault) via a long message to cmd.cgi.
- openSUSE-SU-2014:0516
- openSUSE-SU-2014:0516
- 57024
- 57024
- 65605
- 65605
- https://bugzilla.redhat.com/show_bug.cgi?id=1066578
- https://bugzilla.redhat.com/show_bug.cgi?id=1066578
- https://dev.icinga.org/issues/5434
- https://dev.icinga.org/issues/5434
- [debian-lts-announce] 20181224 [SECURITY] [DLA 1615-1] nagios3 security update
- [debian-lts-announce] 20181224 [SECURITY] [DLA 1615-1] nagios3 security update
- https://www.icinga.org/2014/02/11/bugfix-releases-1-10-3-1-9-5-1-8-6
- https://www.icinga.org/2014/02/11/bugfix-releases-1-10-3-1-9-5-1-8-6
Modified: 2024-11-21
CVE-2016-8641
A privilege escalation vulnerability was found in nagios 4.2.x that occurs in daemon-init.in when creating necessary files and insecurely changing the ownership afterwards. It's possible for the local attacker to create symbolic links before the files are to be created and possibly escalating the privileges with the ownership change.
- 95121
- 95121
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8641
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8641
- https://github.com/NagiosEnterprises/nagioscore/commit/f2ed227673d3b2da643eb5cad26b2d87674f28c1.patch
- https://github.com/NagiosEnterprises/nagioscore/commit/f2ed227673d3b2da643eb5cad26b2d87674f28c1.patch
- GLSA-201702-26
- GLSA-201702-26
- 40774
- 40774
Modified: 2024-11-21
CVE-2016-9566
base/logging.c in Nagios Core before 4.2.4 allows local users with access to an account in the nagios group to gain root privileges via a symlink attack on the log file. NOTE: this can be leveraged by remote attackers using CVE-2016-9565.
- RHSA-2017:0211
- RHSA-2017:0211
- RHSA-2017:0212
- RHSA-2017:0212
- RHSA-2017:0213
- RHSA-2017:0213
- RHSA-2017:0214
- RHSA-2017:0214
- RHSA-2017:0258
- RHSA-2017:0258
- RHSA-2017:0259
- RHSA-2017:0259
- 20161215 Nagios Core < 4.2.4 Root Privilege Escalation [CVE-2016-9566]
- 20161215 Nagios Core < 4.2.4 Root Privilege Escalation [CVE-2016-9566]
- 94919
- 94919
- 1037487
- 1037487
- https://bugzilla.redhat.com/show_bug.cgi?id=1402869
- https://bugzilla.redhat.com/show_bug.cgi?id=1402869
- https://github.com/NagiosEnterprises/nagioscore/commit/c29557dec91eba2306f5fb11b8da4474ba63f8c4
- https://github.com/NagiosEnterprises/nagioscore/commit/c29557dec91eba2306f5fb11b8da4474ba63f8c4
- https://legalhackers.com/advisories/Nagios-Exploit-Root-PrivEsc-CVE-2016-9566.html
- https://legalhackers.com/advisories/Nagios-Exploit-Root-PrivEsc-CVE-2016-9566.html
- [debian-lts-announce] 20181224 [SECURITY] [DLA 1615-1] nagios3 security update
- [debian-lts-announce] 20181224 [SECURITY] [DLA 1615-1] nagios3 security update
- GLSA-201612-51
- GLSA-201612-51
- GLSA-201702-26
- GLSA-201702-26
- GLSA-201710-20
- GLSA-201710-20
- 40921
- 40921
- https://www.nagios.org/projects/nagios-core/history/4x/
- https://www.nagios.org/projects/nagios-core/history/4x/
Modified: 2024-11-21
CVE-2017-12847
Nagios Core before 4.3.3 creates a nagios.lock PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for nagios.lock modification before a root script executes a "kill `cat /pathname/nagios.lock`" command.
- 100403
- 100403
- https://github.com/NagiosEnterprises/nagioscore/blob/master/Changelog
- https://github.com/NagiosEnterprises/nagioscore/blob/master/Changelog
- https://github.com/NagiosEnterprises/nagioscore/commit/1b197346d490df2e2d3b1dcce5ac6134ad0c8752
- https://github.com/NagiosEnterprises/nagioscore/commit/1b197346d490df2e2d3b1dcce5ac6134ad0c8752
- https://github.com/NagiosEnterprises/nagioscore/commit/3baffa78bafebbbdf9f448890ba5a952ea2d73cb
- https://github.com/NagiosEnterprises/nagioscore/commit/3baffa78bafebbbdf9f448890ba5a952ea2d73cb
- https://github.com/NagiosEnterprises/nagioscore/issues/404
- https://github.com/NagiosEnterprises/nagioscore/issues/404
- GLSA-201710-20
- GLSA-201710-20
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-25725
In Xpdf 4.02, SplashOutputDev::endType3Char(GfxState *state) SplashOutputDev.cc:3079 is trying to use the freed `t3GlyphStack->cache`, which causes an `heap-use-after-free` problem. The codes of a previous fix for nested Type 3 characters wasn't correctly handling the case where a Type 3 char referred to another char in the same Type 3 font.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25725
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25725
- https://forum.xpdfreader.com/viewtopic.php?f=3&t=41915
- https://forum.xpdfreader.com/viewtopic.php?f=3&t=41915
- FEDORA-2021-4a437fe032
- FEDORA-2021-4a437fe032
- FEDORA-2021-013d9a30e0
- FEDORA-2021-013d9a30e0
Modified: 2024-11-21
CVE-2020-35376
Xpdf 4.02 allows stack consumption because of an incorrect subroutine reference in a Type 1C font charstring, related to the FoFiType1C::getOp() function.