Accepted nagios 2:1.3-cvs.20050402-8ubuntu6 (source)

Martin Pitt martin.pitt at ubuntu.com
Mon May 8 08:25:10 BST 2006


Accepted:
 OK: nagios_1.3-cvs.20050402-8ubuntu6.dsc
     -> Component: main Section: net
 OK: nagios_1.3-cvs.20050402-8ubuntu6.diff.gz

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon,  8 May 2006 09:22:15 +0200
Source: nagios
Binary: nagios-pgsql nagios-text nagios-mysql nagios-common
Architecture: source
Version: 2:1.3-cvs.20050402-8ubuntu6
Distribution: dapper
Urgency: low
Maintainer: Debian Nagios Maintainer Group <pkg-nagios-devel at lists.alioth.debian.org>
Changed-By: Martin Pitt <martin.pitt at ubuntu.com>
Description: 
 nagios-common - A host/service/network monitoring and management system
 nagios-mysql - A host/service/network monitoring and management system
 nagios-pgsql - A host/service/network monitoring and management system
 nagios-text - A host/service/network monitoring and management system
Changes: 
 nagios (2:1.3-cvs.20050402-8ubuntu6) dapper; urgency=low
 .
   * SECURITY UPDATE: Remote arbitrary code execution with web servers that do
     not check for bogus Content-Length headers (Apache 2 does).
   * Add debian/patches/14_getcgi-negative-content-length.dpatch:
     - cgi/getcgi.c: Check for negative Content-Length values to avoid buffer
       overflow.
   * CVE-2006-2162
Files: 
 9139b6075ec2cd759bce25eee203c783 953 net optional nagios_1.3-cvs.20050402-8ubuntu6.dsc
 a141169ebe1ef0fcaabbaa777bd83186 71573 net optional nagios_1.3-cvs.20050402-8ubuntu6.diff.gz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEXvHbDecnbV4Fd/IRAh8YAJ4n2SyCu1fdLlawcElAJ7X7ZoBD/wCcC56M
HzgpxDdtgaCSx+7u2S588B0=
=fk84
-----END PGP SIGNATURE-----





More information about the dapper-changes mailing list