Описание
Security update for nagios
This update for nagios fixes the following issues:
- CVE-2016-8641 / CVE-2016-10089: fixed possible symlink attacks for files/directories created by root (bsc#1011630 / bsc#1018047)
Список пакетов
SUSE Linux Enterprise Server 11 SP4
nagios-3.0.6-1.25.36.3.1
nagios-www-3.0.6-1.25.36.3.1
SUSE Linux Enterprise Server for SAP Applications 11 SP4
nagios-3.0.6-1.25.36.3.1
nagios-www-3.0.6-1.25.36.3.1
SUSE Linux Enterprise Software Development Kit 11 SP4
nagios-3.0.6-1.25.36.3.1
nagios-devel-3.0.6-1.25.36.3.1
nagios-www-3.0.6-1.25.36.3.1
Ссылки
- Link for SUSE-SU-2018:3240-1
- E-Mail link for SUSE-SU-2018:3240-1
- SUSE Security Ratings
- SUSE Bug 1011630
- SUSE Bug 1018047
- SUSE CVE CVE-2016-10089 page
- SUSE CVE CVE-2016-8641 page
Описание
Nagios 4.3.2 and earlier allows local users to gain root privileges via a hard link attack on the Nagios init script file, related to CVE-2016-8641.
Затронутые продукты
SUSE Linux Enterprise Server 11 SP4:nagios-3.0.6-1.25.36.3.1
SUSE Linux Enterprise Server 11 SP4:nagios-www-3.0.6-1.25.36.3.1
SUSE Linux Enterprise Server for SAP Applications 11 SP4:nagios-3.0.6-1.25.36.3.1
SUSE Linux Enterprise Server for SAP Applications 11 SP4:nagios-www-3.0.6-1.25.36.3.1
Ссылки
- CVE-2016-10089
- SUSE Bug 1011630
- SUSE Bug 1018047
Описание
A privilege escalation vulnerability was found in nagios 4.2.x that occurs in daemon-init.in when creating necessary files and insecurely changing the ownership afterwards. It's possible for the local attacker to create symbolic links before the files are to be created and possibly escalating the privileges with the ownership change.
Затронутые продукты
SUSE Linux Enterprise Server 11 SP4:nagios-3.0.6-1.25.36.3.1
SUSE Linux Enterprise Server 11 SP4:nagios-www-3.0.6-1.25.36.3.1
SUSE Linux Enterprise Server for SAP Applications 11 SP4:nagios-3.0.6-1.25.36.3.1
SUSE Linux Enterprise Server for SAP Applications 11 SP4:nagios-www-3.0.6-1.25.36.3.1
Ссылки
- CVE-2016-8641
- SUSE Bug 1011630
- SUSE Bug 1018047