Mageia 2020-0247: nrpe security update
Summary
Advisory text to describe the update.
Wrap lines at ~75 chars.
Updated nrpe packages fix security vulnerabilities:
Nagios NRPE 3.2.1 has Insufficient Filtering because, for example,
nasty_metachars interprets \n as the character \ and the character n
(not as the \n newline sequence). This can cause command injection
(CVE-2020-6581).
Nagios NRPE 3.2.1 has a Heap-Based Buffer Overflow, as demonstrated by
interpretation of a small negative number as a large positive number
during a bzero call (CVE-2020-6582).
References
- https://bugs.mageia.org/show_bug.cgi?id=26482
- https://herolab.usd.de/security-advisories/usd-2020-0001/
- https://herolab.usd.de/security-advisories/usd-2020-0002/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/4HL6LSLRKKPUIY2PIWFGZ7QMM7FKARMR/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6581
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6582
Resolution
MGASA-2020-0247 - Updated nrpe packages fix security vulnerability
SRPMS
- 7/core/nrpe-3.2.1-3.2.mga7