MGASA-2017-0437

Source
https://advisories.mageia.org/MGASA-2017-0437.html
Import Source
https://advisories.mageia.org/MGASA-2017-0437.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2017-0437
Related
Published
2017-12-01T23:13:21Z
Modified
2017-12-01T22:47:08Z
Summary
Updated nagios packages fix security vulnerability
Details

It was found that nagios daemon creates its PID file after dropping privileges, which allows to change its content by non-root user with PID of any other process, resulting into denial-of-service when daemon is stopped (CVE-2017-12847).

Note that the nagios package on Mageia 5 is no longer supported. Users of this package should upgrade to Mageia 6.

References
Credits

Affected packages

Mageia:6 / nagios

Package

Name
nagios
Purl
pkg:rpm/mageia/nagios?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.3.1-2.1.mga6

Ecosystem specific

{
    "section": "core"
}