CVE-2013-7108
Bug #1279826 reported by
Alexandros Kosiaris
This bug affects 2 people
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
icinga (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Precise |
Won't Fix
|
Medium
|
Unassigned | ||
Trusty |
Fix Released
|
Undecided
|
Unassigned | ||
Vivid |
Fix Released
|
Undecided
|
Unassigned | ||
Wily |
Fix Released
|
Undecided
|
Unassigned | ||
nagios3 (Ubuntu) |
Confirmed
|
Low
|
Unassigned | ||
Precise |
Won't Fix
|
Low
|
Unassigned | ||
Trusty |
Confirmed
|
Low
|
Unassigned | ||
Vivid |
Confirmed
|
Low
|
Unassigned | ||
Wily |
Confirmed
|
Low
|
Unassigned |
Bug Description
Seems like the version shipped in Ubuntu Precise suffers from CVE-2013-7108 (buffer overflows)
1) Description: Ubuntu 12.04.4 LTS
Release: 12.04
2) apt-cache policy icinga
icinga:
Installed: 1.6.1-2
Candidate: 1.6.1-2
Version table:
*** 1.6.1-2 0
500 http://
100 /var/lib/
A lot of info plus patches exist here:
https:/
Changed in icinga (Ubuntu): | |
status: | Expired → Fix Released |
Changed in icinga (Ubuntu Precise): | |
status: | New → Confirmed |
importance: | Undecided → Medium |
Changed in icinga (Ubuntu Trusty): | |
status: | New → Fix Released |
Changed in icinga (Ubuntu Vivid): | |
status: | New → Fix Released |
Changed in nagios3 (Ubuntu Precise): | |
importance: | Undecided → Low |
status: | New → Confirmed |
Changed in nagios3 (Ubuntu Trusty): | |
importance: | Undecided → Low |
status: | New → Confirmed |
Changed in nagios3 (Ubuntu Vivid): | |
importance: | Undecided → Low |
status: | New → Confirmed |
Changed in nagios3 (Ubuntu Wily): | |
importance: | Undecided → Low |
status: | New → Confirmed |
Changed in nagios3 (Ubuntu Precise): | |
status: | Confirmed → Won't Fix |
To post a comment you must log in.
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https:/ /wiki.ubuntu. com/SecurityTea m/UpdateProcedu res