From ${URL} : > Von: cve-assign@...re.org > Betreff: Aw: Vulnerability (Buffer Overflow) in Icinga 1.8, 1.9 and 1.10 (Icinga Issue #5250) Vulnerability (Off-by-one memory access) in Icinga 1.8, 1.9 and 1.10 (Icinga Issue #5251) > Datum: 15. Dezember 2013 19:29:59 MEZ > An: ricardo@...chbrothers.com > Kopie: cve-assign@...re.org > > Signierter PGP Teil > Here are the three CVE IDs for your recent reports. Because one report > mentions CSRF, our expectation is that some type of CSRF impact would > remain even after the buffer overflows were fixed. > > > This is fixed with Icinga (https://dev.icinga.org/issues/5250): > > 1.10.2 > > 1.9.4 > > 1.8.5 > > > > The icinga web gui is susceptible to several buffer overflow flaws, > > which can be triggered as a logged on user. > > > > controlling the program flow by modifying the stack content > > Use CVE-2013-7106. > > > > A remote attacker may utilize a CSRF (cross site request forgery) > > attack vector against a logged in user > > Use CVE-2013-7107. > > > > This is fixed with Icinga (https://dev.icinga.org/issues/5251): > > 1.10.2 > > 1.9.4 > > 1.8.5 > > > > This probably affects Nagios in current version as well! > > > > The icinga web gui are susceptible to an "off-by-one read" error ... > > the check routine can be forced to skip the terminating null pointer > > and read the heap address right after the end of the parameter list. > > Depending on the memory layout, this may result in a memory corruption > > condition/crash or reading of sensitive memory locations. > > Use CVE-2013-7108. @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
removed badness added goodness fixes are in tree as 1.9.4 and 1.10.2. Vulnerable ebuilds removed. No need to stablize.
Okay then. Closing noglsa, since this is ~ only.
@ Chris: before close the bugs please fix the summary