Accepted nagios 2:1.3-cvs.20050402-8ubuntu6 (source)
Martin Pitt
martin.pitt at ubuntu.com
Mon May 8 08:25:10 BST 2006
Accepted:
OK: nagios_1.3-cvs.20050402-8ubuntu6.dsc
-> Component: main Section: net
OK: nagios_1.3-cvs.20050402-8ubuntu6.diff.gz
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Mon, 8 May 2006 09:22:15 +0200
Source: nagios
Binary: nagios-pgsql nagios-text nagios-mysql nagios-common
Architecture: source
Version: 2:1.3-cvs.20050402-8ubuntu6
Distribution: dapper
Urgency: low
Maintainer: Debian Nagios Maintainer Group <pkg-nagios-devel at lists.alioth.debian.org>
Changed-By: Martin Pitt <martin.pitt at ubuntu.com>
Description:
nagios-common - A host/service/network monitoring and management system
nagios-mysql - A host/service/network monitoring and management system
nagios-pgsql - A host/service/network monitoring and management system
nagios-text - A host/service/network monitoring and management system
Changes:
nagios (2:1.3-cvs.20050402-8ubuntu6) dapper; urgency=low
.
* SECURITY UPDATE: Remote arbitrary code execution with web servers that do
not check for bogus Content-Length headers (Apache 2 does).
* Add debian/patches/14_getcgi-negative-content-length.dpatch:
- cgi/getcgi.c: Check for negative Content-Length values to avoid buffer
overflow.
* CVE-2006-2162
Files:
9139b6075ec2cd759bce25eee203c783 953 net optional nagios_1.3-cvs.20050402-8ubuntu6.dsc
a141169ebe1ef0fcaabbaa777bd83186 71573 net optional nagios_1.3-cvs.20050402-8ubuntu6.diff.gz
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
iD8DBQFEXvHbDecnbV4Fd/IRAh8YAJ4n2SyCu1fdLlawcElAJ7X7ZoBD/wCcC56M
HzgpxDdtgaCSx+7u2S588B0=
=fk84
-----END PGP SIGNATURE-----
More information about the dapper-changes
mailing list