[ubuntu/saucy-proposed] nagios-nrpe 2.13-3ubuntu1 (Accepted)

Michael Terry mterry at ubuntu.com
Tue Apr 30 16:40:41 UTC 2013


nagios-nrpe (2.13-3ubuntu1) saucy; urgency=low

  * Merge from Debian unstable.  Remaining changes:
    - debian/{rules,control}: Add hardening-includes to gain PIE security
      builds.
    - debian/rules: Use dpkg-buildflags.

nagios-nrpe (2.13-3) unstable; urgency=high

  * [e55afd1] Add 08_CVE-2013-1362.dpatch patch.
    If command arguments are enabled in the NRPE configuration, it was
    possible to pass $() as arguments as the checking for nasty caracters
    was not strict enough to catch $(). This allowed executing shell
    commands under a subprocess and pass the output as a parameter to the
    called script (if run under bash). CVE-2013-1362 (Closes: #701227)

Date: Tue, 30 Apr 2013 09:24:13 -0700
Changed-By: Michael Terry <mterry at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel at lists.ubuntu.com>
https://launchpad.net/ubuntu/saucy/+source/nagios-nrpe/2.13-3ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Tue, 30 Apr 2013 09:24:13 -0700
Source: nagios-nrpe
Binary: nagios-nrpe-server nagios-nrpe-plugin
Architecture: source
Version: 2.13-3ubuntu1
Distribution: saucy
Urgency: high
Maintainer: Ubuntu Developers <ubuntu-devel at lists.ubuntu.com>
Changed-By: Michael Terry <mterry at ubuntu.com>
Description: 
 nagios-nrpe-plugin - Nagios Remote Plugin Executor Plugin
 nagios-nrpe-server - Nagios Remote Plugin Executor Server
Closes: 701227
Changes: 
 nagios-nrpe (2.13-3ubuntu1) saucy; urgency=low
 .
   * Merge from Debian unstable.  Remaining changes:
     - debian/{rules,control}: Add hardening-includes to gain PIE security
       builds.
     - debian/rules: Use dpkg-buildflags.
 .
 nagios-nrpe (2.13-3) unstable; urgency=high
 .
   * [e55afd1] Add 08_CVE-2013-1362.dpatch patch.
     If command arguments are enabled in the NRPE configuration, it was
     possible to pass $() as arguments as the checking for nasty caracters
     was not strict enough to catch $(). This allowed executing shell
     commands under a subprocess and pass the output as a parameter to the
     called script (if run under bash). CVE-2013-1362 (Closes: #701227)
Checksums-Sha1: 
 8397d08ecc26e1f3d7a6e08eb7b46eed14d6f92e 1475 nagios-nrpe_2.13-3ubuntu1.dsc
 6c34709dc47ed0336e25e01a6e0aa86563f6ee0f 11969 nagios-nrpe_2.13-3ubuntu1.diff.gz
Checksums-Sha256: 
 e20fbb2a0939e179a673adac047db5936d8515300bed4a97472ac14afc191292 1475 nagios-nrpe_2.13-3ubuntu1.dsc
 a804d9af2e1b8aa89ae275d4f5f65658f2e5e2cc4cf15285410124d54097df8b 11969 nagios-nrpe_2.13-3ubuntu1.diff.gz
Files: 
 7b1f2eabc391f7b20b7a5cf6bb65babf 1475 net optional nagios-nrpe_2.13-3ubuntu1.dsc
 67d90c1efc6d139bdd5fa26e7f6f956a 11969 net optional nagios-nrpe_2.13-3ubuntu1.diff.gz
Original-Maintainer: Debian Nagios Maintainer Group <pkg-nagios-devel at lists.alioth.debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlF/8pIACgkQ53i2YxNrdi2kNgCg4jvXV0KR8KaMK1brOFPpJxFN
uKQAn0Wtv8O00PyuoBxcnRiHRfTPythC
=WbJM
-----END PGP SIGNATURE-----


More information about the Saucy-changes mailing list