ALT-BU-2025-8981-1
Branch sisyphus_riscv64 update bulletin.
Package streamlink updated to version 7.4.0-alt1 for branch sisyphus_riscv64.
Closed bugs
Разрешить сборку lxml 6
Package python3-module-soundcard updated to version 0.4.4-alt2 for branch sisyphus_riscv64.
Closed bugs
python3-module-soundcard: ошибка импорта модуля
Package webapp-manager updated to version 1.4.0-alt1 for branch sisyphus_riscv64.
Closed bugs
webapp-manager: обновить до новой версии
Package python3-module-h11 updated to version 0.16.0-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2025-06251
Уязвимость библиотеки h11, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю оказать влияние на конфиденциальность и целостность защищаемой информации
Modified: 2025-04-29
CVE-2025-43859
h11 is a Python implementation of HTTP/1.1. Prior to version 0.16.0, a leniency in h11's parsing of line terminators in chunked-coding message bodies can lead to request smuggling vulnerabilities under certain conditions. This issue has been patched in version 0.16.0. Since exploitation requires the combination of buggy h11 with a buggy (reverse) proxy, fixing either component is sufficient to mitigate this issue.
Closed bugs
CVE-2025-43859 in python-module-h11 0.14
Package nagios updated to version 4.5.9-alt2 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2015-03479
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2025-04-09
CVE-2008-4796
The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3 and earlier, as used in (1) ampache, (2) libphp-snoopy, (3) mahara, (4) mediamate, (5) opendb, (6) pixelpost, and possibly other products, allows remote attackers to execute arbitrary commands via shell metacharacters in https URLs.
- http://jvn.jp/en/jp/JVN20502807/index.html
- http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000074.html
- http://secunia.com/advisories/32361
- http://sourceforge.net/forum/forum.php?forum_id=879959
- http://www.debian.org/security/2008/dsa-1691
- http://www.debian.org/security/2009/dsa-1871
- http://www.openwall.com/lists/oss-security/2008/11/01/1
- http://www.securityfocus.com/archive/1/496068/100/0/threaded
- http://www.securityfocus.com/bid/31887
- http://www.vupen.com/english/advisories/2008/2901
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46068
- https://security.gentoo.org/glsa/201702-26
- https://www.nagios.org/projects/nagios-core/history/4x/
- http://jvn.jp/en/jp/JVN20502807/index.html
- http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000074.html
- http://secunia.com/advisories/32361
- http://sourceforge.net/forum/forum.php?forum_id=879959
- http://www.debian.org/security/2008/dsa-1691
- http://www.debian.org/security/2009/dsa-1871
- http://www.openwall.com/lists/oss-security/2008/11/01/1
- http://www.securityfocus.com/archive/1/496068/100/0/threaded
- http://www.securityfocus.com/bid/31887
- http://www.vupen.com/english/advisories/2008/2901
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46068
- https://security.gentoo.org/glsa/201702-26
- https://www.nagios.org/projects/nagios-core/history/4x/
Modified: 2025-04-20
CVE-2008-7313
The _httpsrequest function in Snoopy allows remote attackers to execute arbitrary commands. NOTE: this issue exists dues to an incomplete fix for CVE-2008-4796.
- http://snoopy.cvs.sourceforge.net/viewvc/snoopy/Snoopy/Snoopy.class.php?view=log#rev1.27
- http://www.openwall.com/lists/oss-security/2014/07/09/11
- http://www.openwall.com/lists/oss-security/2014/07/16/10
- http://www.openwall.com/lists/oss-security/2014/07/18/2
- http://www.securityfocus.com/bid/68776
- https://bugzilla.redhat.com/show_bug.cgi?id=1121497
- https://exchange.xforce.ibmcloud.com/vulnerabilities/94737
- https://rhn.redhat.com/errata/RHSA-2017-0211.html
- https://rhn.redhat.com/errata/RHSA-2017-0212.html
- https://rhn.redhat.com/errata/RHSA-2017-0213.html
- https://rhn.redhat.com/errata/RHSA-2017-0214.html
- https://security.gentoo.org/glsa/201702-26
- https://www-01.ibm.com/support/docview.wss?uid=isg3T1024264
- http://snoopy.cvs.sourceforge.net/viewvc/snoopy/Snoopy/Snoopy.class.php?view=log#rev1.27
- http://www.openwall.com/lists/oss-security/2014/07/09/11
- http://www.openwall.com/lists/oss-security/2014/07/16/10
- http://www.openwall.com/lists/oss-security/2014/07/18/2
- http://www.securityfocus.com/bid/68776
- https://bugzilla.redhat.com/show_bug.cgi?id=1121497
- https://exchange.xforce.ibmcloud.com/vulnerabilities/94737
- https://rhn.redhat.com/errata/RHSA-2017-0211.html
- https://rhn.redhat.com/errata/RHSA-2017-0212.html
- https://rhn.redhat.com/errata/RHSA-2017-0213.html
- https://rhn.redhat.com/errata/RHSA-2017-0214.html
- https://security.gentoo.org/glsa/201702-26
- https://www-01.ibm.com/support/docview.wss?uid=isg3T1024264
Modified: 2025-04-09
CVE-2009-2288
statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.
- http://marc.info/?l=bugtraq&m=126996888626964&w=2
- http://marc.info/?l=bugtraq&m=126996888626964&w=2
- http://secunia.com/advisories/35543
- http://secunia.com/advisories/35688
- http://secunia.com/advisories/35692
- http://secunia.com/advisories/39227
- http://security.gentoo.org/glsa/glsa-200907-15.xml
- http://tracker.nagios.org/view.php?id=15
- http://www.debian.org/security/2009/dsa-1825
- http://www.nagios.org/development/history/core-3x/
- http://www.securitytracker.com/id?1022503
- http://www.ubuntu.com/usn/USN-795-1
- http://www.vupen.com/english/advisories/2010/0750
- http://marc.info/?l=bugtraq&m=126996888626964&w=2
- http://marc.info/?l=bugtraq&m=126996888626964&w=2
- http://secunia.com/advisories/35543
- http://secunia.com/advisories/35688
- http://secunia.com/advisories/35692
- http://secunia.com/advisories/39227
- http://security.gentoo.org/glsa/glsa-200907-15.xml
- http://tracker.nagios.org/view.php?id=15
- http://www.debian.org/security/2009/dsa-1825
- http://www.nagios.org/development/history/core-3x/
- http://www.securitytracker.com/id?1022503
- http://www.ubuntu.com/usn/USN-795-1
- http://www.vupen.com/english/advisories/2010/0750
Modified: 2025-04-11
CVE-2011-1523
Cross-site scripting (XSS) vulnerability in statusmap.c in statusmap.cgi in Nagios 3.2.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the layer parameter.
- http://openwall.com/lists/oss-security/2011/03/25/3
- http://openwall.com/lists/oss-security/2011/03/28/4
- http://secunia.com/advisories/43287
- http://secunia.com/advisories/44974
- http://securityreason.com/securityalert/8241
- http://tracker.nagios.org/view.php?id=207
- http://www.rul3z.de/advisories/SSCHADV2011-002.txt
- http://www.ubuntu.com/usn/USN-1151-1
- https://bugzilla.redhat.com/show_bug.cgi?id=690877
- http://openwall.com/lists/oss-security/2011/03/25/3
- http://openwall.com/lists/oss-security/2011/03/28/4
- http://secunia.com/advisories/43287
- http://secunia.com/advisories/44974
- http://securityreason.com/securityalert/8241
- http://tracker.nagios.org/view.php?id=207
- http://www.rul3z.de/advisories/SSCHADV2011-002.txt
- http://www.ubuntu.com/usn/USN-1151-1
- https://bugzilla.redhat.com/show_bug.cgi?id=690877
Modified: 2025-04-11
CVE-2012-6096
Multiple stack-based buffer overflows in the get_history function in history.cgi in Nagios Core before 3.4.4, and Icinga 1.6.x before 1.6.2, 1.7.x before 1.7.4, and 1.8.x before 1.8.4, might allow remote attackers to execute arbitrary code via a long (1) host_name variable (host parameter) or (2) svc_description variable.
- http://lists.grok.org.uk/pipermail/full-disclosure/2012-December/089125.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00033.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00060.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00077.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00088.html
- http://secunia.com/advisories/51863
- http://www.debian.org/security/2013/dsa-2616
- http://www.debian.org/security/2013/dsa-2653
- http://www.exploit-db.com/exploits/24084
- http://www.exploit-db.com/exploits/24159
- http://www.nagios.org/projects/nagioscore/history/core-3x
- http://www.osvdb.org/89170
- http://www.securityfocus.com/bid/56879
- https://bugzilla.redhat.com/show_bug.cgi?id=893269
- https://dev.icinga.org/issues/3532
- https://www.icinga.org/2013/01/14/icinga-1-6-2-1-7-4-1-8-4-released/
- http://lists.grok.org.uk/pipermail/full-disclosure/2012-December/089125.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00033.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00060.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00077.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00088.html
- http://secunia.com/advisories/51863
- http://www.debian.org/security/2013/dsa-2616
- http://www.debian.org/security/2013/dsa-2653
- http://www.exploit-db.com/exploits/24084
- http://www.exploit-db.com/exploits/24159
- http://www.nagios.org/projects/nagioscore/history/core-3x
- http://www.osvdb.org/89170
- http://www.securityfocus.com/bid/56879
- https://bugzilla.redhat.com/show_bug.cgi?id=893269
- https://dev.icinga.org/issues/3532
- https://www.icinga.org/2013/01/14/icinga-1-6-2-1-7-4-1-8-4-released/
Modified: 2025-04-11
CVE-2013-2214
status.cgi in Nagios 4.0 before 4.0 beta4 and 3.x before 3.5.1 does not properly restrict access to certain users that are a contact for a service, which allows remote authenticated users to obtain sensitive information about hostnames via the servicegroup (1) overview, (2) summary, or (3) grid style in status.cgi. NOTE: this behavior is by design in most 3.x versions, but the upstream vendor "decided to change it for Nagios 4" and 3.5.1.
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00029.html
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00031.html
- http://seclists.org/oss-sec/2013/q2/619
- http://seclists.org/oss-sec/2013/q2/622
- http://tracker.nagios.org/view.php?id=456
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00029.html
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00031.html
- http://seclists.org/oss-sec/2013/q2/619
- http://seclists.org/oss-sec/2013/q2/622
- http://tracker.nagios.org/view.php?id=456
Modified: 2025-04-11
CVE-2013-4214
rss-newsfeed.php in Nagios Core 3.4.4, 3.5.1, and earlier, when MAGPIE_CACHE_ON is set to 1, allows local users to overwrite arbitrary files via a symlink attack on /tmp/magpie_cache.
- http://rhn.redhat.com/errata/RHSA-2013-1526.html
- http://www.securityfocus.com/bid/61747
- https://bugzilla.redhat.com/show_bug.cgi?id=958002
- https://www.nagios.org/projects/nagios-core/history/4x/
- http://rhn.redhat.com/errata/RHSA-2013-1526.html
- http://www.securityfocus.com/bid/61747
- https://bugzilla.redhat.com/show_bug.cgi?id=958002
- https://www.nagios.org/projects/nagios-core/history/4x/
Modified: 2025-04-11
CVE-2013-7108
Multiple off-by-one errors in Nagios Core 3.5.1, 4.0.2, and earlier, and Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list to the process_cgivars function in (1) avail.c, (2) cmd.c, (3) config.c, (4) extinfo.c, (5) histogram.c, (6) notifications.c, (7) outages.c, (8) status.c, (9) statusmap.c, (10) summary.c, and (11) trends.c in cgi/, which triggers a heap-based buffer over-read.
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00010.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00028.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00046.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00068.html
- http://secunia.com/advisories/55976
- http://secunia.com/advisories/56316
- http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:004
- http://www.openwall.com/lists/oss-security/2013/12/24/1
- http://www.securityfocus.com/bid/64363
- https://dev.icinga.org/issues/5251
- https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html
- https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00010.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00028.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00046.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00068.html
- http://secunia.com/advisories/55976
- http://secunia.com/advisories/56316
- http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:004
- http://www.openwall.com/lists/oss-security/2013/12/24/1
- http://www.securityfocus.com/bid/64363
- https://dev.icinga.org/issues/5251
- https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html
- https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/
Modified: 2025-04-11
CVE-2013-7205
Off-by-one error in the process_cgivars function in contrib/daemonchk.c in Nagios Core 3.5.1, 4.0.2, and earlier allows remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list, which triggers a heap-based buffer over-read.
- http://secunia.com/advisories/55976
- http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:004
- http://www.openwall.com/lists/oss-security/2013/12/24/1
- http://www.securityfocus.com/bid/64489
- https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html
- http://secunia.com/advisories/55976
- http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:004
- http://www.openwall.com/lists/oss-security/2013/12/24/1
- http://www.securityfocus.com/bid/64489
- https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html
Modified: 2025-04-12
CVE-2014-1878
Stack-based buffer overflow in the cmd_submitf function in cgi/cmd.c in Nagios Core, possibly 4.0.3rc1 and earlier, and Icinga before 1.8.6, 1.9 before 1.9.5, and 1.10 before 1.10.3 allows remote attackers to cause a denial of service (segmentation fault) via a long message to cmd.cgi.
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00033.html
- http://secunia.com/advisories/57024
- http://www.securityfocus.com/bid/65605
- https://bugzilla.redhat.com/show_bug.cgi?id=1066578
- https://dev.icinga.org/issues/5434
- https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html
- https://www.icinga.org/2014/02/11/bugfix-releases-1-10-3-1-9-5-1-8-6
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00033.html
- http://secunia.com/advisories/57024
- http://www.securityfocus.com/bid/65605
- https://bugzilla.redhat.com/show_bug.cgi?id=1066578
- https://dev.icinga.org/issues/5434
- https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html
- https://www.icinga.org/2014/02/11/bugfix-releases-1-10-3-1-9-5-1-8-6
Modified: 2025-04-20
CVE-2014-5009
Snoopy allows remote attackers to execute arbitrary commands. NOTE: this vulnerability exists due to an incomplete fix for CVE-2014-5008.
- http://rhn.redhat.com/errata/RHSA-2017-0211.html
- http://rhn.redhat.com/errata/RHSA-2017-0212.html
- http://rhn.redhat.com/errata/RHSA-2017-0213.html
- http://rhn.redhat.com/errata/RHSA-2017-0214.html
- http://snoopy.cvs.sourceforge.net/viewvc/snoopy/Snoopy/Snoopy.class.php?r1=1.28&r2=1.29
- http://www.openwall.com/lists/oss-security/2014/07/09/11
- http://www.openwall.com/lists/oss-security/2014/07/16/10
- http://www.openwall.com/lists/oss-security/2014/07/18/2
- http://www.securityfocus.com/bid/68783
- https://bugzilla.redhat.com/show_bug.cgi?id=1121497
- https://exchange.xforce.ibmcloud.com/vulnerabilities/94738
- https://github.com/cogdog/feed2js/pull/12#issuecomment-48283706
- https://www-01.ibm.com/support/docview.wss?uid=isg3T1024264
- http://rhn.redhat.com/errata/RHSA-2017-0211.html
- http://rhn.redhat.com/errata/RHSA-2017-0212.html
- http://rhn.redhat.com/errata/RHSA-2017-0213.html
- http://rhn.redhat.com/errata/RHSA-2017-0214.html
- http://snoopy.cvs.sourceforge.net/viewvc/snoopy/Snoopy/Snoopy.class.php?r1=1.28&r2=1.29
- http://www.openwall.com/lists/oss-security/2014/07/09/11
- http://www.openwall.com/lists/oss-security/2014/07/16/10
- http://www.openwall.com/lists/oss-security/2014/07/18/2
- http://www.securityfocus.com/bid/68783
- https://bugzilla.redhat.com/show_bug.cgi?id=1121497
- https://exchange.xforce.ibmcloud.com/vulnerabilities/94738
- https://github.com/cogdog/feed2js/pull/12#issuecomment-48283706
- https://www-01.ibm.com/support/docview.wss?uid=isg3T1024264
Modified: 2025-04-20
CVE-2016-10089
Nagios 4.3.2 and earlier allows local users to gain root privileges via a hard link attack on the Nagios init script file, related to CVE-2016-8641.
Modified: 2025-04-12
CVE-2016-9565
MagpieRSS, as used in the front-end component in Nagios Core before 4.2.2 might allow remote attackers to read or write to arbitrary files by spoofing a crafted response from the Nagios RSS feed server. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4796.
- http://packetstormsecurity.com/files/140169/Nagios-Core-Curl-Command-Injection-Code-Execution.html
- http://rhn.redhat.com/errata/RHSA-2017-0211.html
- http://rhn.redhat.com/errata/RHSA-2017-0212.html
- http://rhn.redhat.com/errata/RHSA-2017-0213.html
- http://rhn.redhat.com/errata/RHSA-2017-0214.html
- http://rhn.redhat.com/errata/RHSA-2017-0258.html
- http://rhn.redhat.com/errata/RHSA-2017-0259.html
- http://seclists.org/fulldisclosure/2016/Dec/57
- http://www.securityfocus.com/archive/1/539925/100/0/threaded
- http://www.securityfocus.com/bid/94922
- http://www.securitytracker.com/id/1037488
- https://legalhackers.com/advisories/Nagios-Exploit-Command-Injection-CVE-2016-9565-2008-4796.html
- https://security.gentoo.org/glsa/201702-26
- https://security.gentoo.org/glsa/201710-20
- https://www.exploit-db.com/exploits/40920/
- https://www.nagios.org/projects/nagios-core/history/4x/
- http://packetstormsecurity.com/files/140169/Nagios-Core-Curl-Command-Injection-Code-Execution.html
- http://rhn.redhat.com/errata/RHSA-2017-0211.html
- http://rhn.redhat.com/errata/RHSA-2017-0212.html
- http://rhn.redhat.com/errata/RHSA-2017-0213.html
- http://rhn.redhat.com/errata/RHSA-2017-0214.html
- http://rhn.redhat.com/errata/RHSA-2017-0258.html
- http://rhn.redhat.com/errata/RHSA-2017-0259.html
- http://seclists.org/fulldisclosure/2016/Dec/57
- http://www.securityfocus.com/archive/1/539925/100/0/threaded
- http://www.securityfocus.com/bid/94922
- http://www.securitytracker.com/id/1037488
- https://legalhackers.com/advisories/Nagios-Exploit-Command-Injection-CVE-2016-9565-2008-4796.html
- https://security.gentoo.org/glsa/201702-26
- https://security.gentoo.org/glsa/201710-20
- https://www.exploit-db.com/exploits/40920/
- https://www.nagios.org/projects/nagios-core/history/4x/
Modified: 2025-04-12
CVE-2016-9566
base/logging.c in Nagios Core before 4.2.4 allows local users with access to an account in the nagios group to gain root privileges via a symlink attack on the log file. NOTE: this can be leveraged by remote attackers using CVE-2016-9565.
- http://rhn.redhat.com/errata/RHSA-2017-0211.html
- http://rhn.redhat.com/errata/RHSA-2017-0212.html
- http://rhn.redhat.com/errata/RHSA-2017-0213.html
- http://rhn.redhat.com/errata/RHSA-2017-0214.html
- http://rhn.redhat.com/errata/RHSA-2017-0258.html
- http://rhn.redhat.com/errata/RHSA-2017-0259.html
- http://seclists.org/fulldisclosure/2016/Dec/58
- http://www.securityfocus.com/bid/94919
- http://www.securitytracker.com/id/1037487
- https://bugzilla.redhat.com/show_bug.cgi?id=1402869
- https://github.com/NagiosEnterprises/nagioscore/commit/c29557dec91eba2306f5fb11b8da4474ba63f8c4
- https://legalhackers.com/advisories/Nagios-Exploit-Root-PrivEsc-CVE-2016-9566.html
- https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html
- https://security.gentoo.org/glsa/201612-51
- https://security.gentoo.org/glsa/201702-26
- https://security.gentoo.org/glsa/201710-20
- https://www.exploit-db.com/exploits/40921/
- https://www.nagios.org/projects/nagios-core/history/4x/
- http://rhn.redhat.com/errata/RHSA-2017-0211.html
- http://rhn.redhat.com/errata/RHSA-2017-0212.html
- http://rhn.redhat.com/errata/RHSA-2017-0213.html
- http://rhn.redhat.com/errata/RHSA-2017-0214.html
- http://rhn.redhat.com/errata/RHSA-2017-0258.html
- http://rhn.redhat.com/errata/RHSA-2017-0259.html
- http://seclists.org/fulldisclosure/2016/Dec/58
- http://www.securityfocus.com/bid/94919
- http://www.securitytracker.com/id/1037487
- https://bugzilla.redhat.com/show_bug.cgi?id=1402869
- https://github.com/NagiosEnterprises/nagioscore/commit/c29557dec91eba2306f5fb11b8da4474ba63f8c4
- https://legalhackers.com/advisories/Nagios-Exploit-Root-PrivEsc-CVE-2016-9566.html
- https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html
- https://security.gentoo.org/glsa/201612-51
- https://security.gentoo.org/glsa/201702-26
- https://security.gentoo.org/glsa/201710-20
- https://www.exploit-db.com/exploits/40921/
- https://www.nagios.org/projects/nagios-core/history/4x/
Modified: 2025-04-20
CVE-2017-12847
Nagios Core before 4.3.3 creates a nagios.lock PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for nagios.lock modification before a root script executes a "kill `cat /pathname/nagios.lock`" command.
- http://www.securityfocus.com/bid/100403
- https://github.com/NagiosEnterprises/nagioscore/blob/master/Changelog
- https://github.com/NagiosEnterprises/nagioscore/commit/1b197346d490df2e2d3b1dcce5ac6134ad0c8752
- https://github.com/NagiosEnterprises/nagioscore/commit/3baffa78bafebbbdf9f448890ba5a952ea2d73cb
- https://github.com/NagiosEnterprises/nagioscore/issues/404
- https://security.gentoo.org/glsa/201710-20
- http://www.securityfocus.com/bid/100403
- https://github.com/NagiosEnterprises/nagioscore/blob/master/Changelog
- https://github.com/NagiosEnterprises/nagioscore/commit/1b197346d490df2e2d3b1dcce5ac6134ad0c8752
- https://github.com/NagiosEnterprises/nagioscore/commit/3baffa78bafebbbdf9f448890ba5a952ea2d73cb
- https://github.com/NagiosEnterprises/nagioscore/issues/404
- https://security.gentoo.org/glsa/201710-20
Modified: 2025-04-20
CVE-2017-14312
Nagios Core through 4.3.4 initially executes /usr/sbin/nagios as root but supports configuration options in which this file is owned by a non-root account (and similarly can have nagios.cfg owned by a non-root account), which allows local users to gain privileges by leveraging access to this non-root account.
Modified: 2024-11-21
CVE-2018-13441
qh_help in Nagios Core version 4.4.1 and earlier is prone to a NULL pointer dereference vulnerability, which allows attacker to cause a local denial-of-service condition by sending a crafted payload to the listening UNIX socket.
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00022.html
- https://gist.github.com/fakhrizulkifli/8df4a174158df69ebd765f824bd736b8
- https://knowledge.opsview.com/v5.3/docs/whats-new
- https://knowledge.opsview.com/v5.4/docs/whats-new
- https://www.exploit-db.com/exploits/45082/
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00022.html
- https://gist.github.com/fakhrizulkifli/8df4a174158df69ebd765f824bd736b8
- https://knowledge.opsview.com/v5.3/docs/whats-new
- https://knowledge.opsview.com/v5.4/docs/whats-new
- https://www.exploit-db.com/exploits/45082/
Modified: 2024-11-21
CVE-2018-13457
qh_echo in Nagios Core 4.4.1 and earlier is prone to a NULL pointer dereference vulnerability, which allows attackers to cause a local denial-of-service condition by sending a crafted payload to the listening UNIX socket.
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00022.html
- https://gist.github.com/fakhrizulkifli/87cf1c1ad403b4d40a86d90c9c9bf7ab
- https://knowledge.opsview.com/v5.3/docs/whats-new
- https://knowledge.opsview.com/v5.4/docs/whats-new
- https://www.exploit-db.com/exploits/45082/
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00022.html
- https://gist.github.com/fakhrizulkifli/87cf1c1ad403b4d40a86d90c9c9bf7ab
- https://knowledge.opsview.com/v5.3/docs/whats-new
- https://knowledge.opsview.com/v5.4/docs/whats-new
- https://www.exploit-db.com/exploits/45082/
Modified: 2024-11-21
CVE-2018-13458
qh_core in Nagios Core 4.4.1 and earlier is prone to a NULL pointer dereference vulnerability, which allows attackers to cause a local denial-of-service condition by sending a crafted payload to the listening UNIX socket.
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00022.html
- https://gist.github.com/fakhrizulkifli/40f3daf52950cca6de28ebec2498ff6e
- https://knowledge.opsview.com/v5.3/docs/whats-new
- https://knowledge.opsview.com/v5.4/docs/whats-new
- https://www.exploit-db.com/exploits/45082/
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00022.html
- https://gist.github.com/fakhrizulkifli/40f3daf52950cca6de28ebec2498ff6e
- https://knowledge.opsview.com/v5.3/docs/whats-new
- https://knowledge.opsview.com/v5.4/docs/whats-new
- https://www.exploit-db.com/exploits/45082/