From owner-freebsd-ports-bugs@FreeBSD.ORG Tue Jun 30 15:10:02 2009 Return-Path: Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id A7D9B10656CD for ; Tue, 30 Jun 2009 15:10:02 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id 8601A8FC16 for ; Tue, 30 Jun 2009 15:10:02 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.14.3/8.14.3) with ESMTP id n5UFA1mC084539 for ; Tue, 30 Jun 2009 15:10:01 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.3/8.14.3/Submit) id n5UFA1aO084538; Tue, 30 Jun 2009 15:10:01 GMT (envelope-from gnats) Resent-Date: Tue, 30 Jun 2009 15:10:01 GMT Resent-Message-Id: <200906301510.n5UFA1aO084538@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Wesley Shields Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 183EB106566C for ; Tue, 30 Jun 2009 15:01:01 +0000 (UTC) (envelope-from wxs@atarininja.org) Received: from syn.atarininja.org (syn.csh.rit.edu [129.21.60.158]) by mx1.freebsd.org (Postfix) with ESMTP id EA6BD8FC13 for ; Tue, 30 Jun 2009 15:01:00 +0000 (UTC) (envelope-from wxs@atarininja.org) Received: by syn.atarininja.org (Postfix, from userid 1001) id 171F55C38; Tue, 30 Jun 2009 10:44:28 -0400 (EDT) Message-Id: <20090630144428.171F55C38@syn.atarininja.org> Date: Tue, 30 Jun 2009 10:44:28 -0400 (EDT) From: Wesley Shields To: FreeBSD-gnats-submit@FreeBSD.org X-Send-Pr-Version: 3.113 Cc: jarrod@netleader.com.au Subject: ports/136187: [PATCH]: net-mgmt/nagios update to address security vulnerability X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Wesley Shields List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 30 Jun 2009 15:10:03 -0000 >Number: 136187 >Category: ports >Synopsis: [PATCH]: net-mgmt/nagios update to address security vulnerability >Confidential: no >Severity: serious >Priority: medium >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: update >Submitter-Id: current-users >Arrival-Date: Tue Jun 30 15:10:01 UTC 2009 >Closed-Date: >Last-Modified: >Originator: Wesley Shields >Release: FreeBSD 7.1-RELEASE-p5 amd64 >Organization: >Environment: System: FreeBSD syn.csh.rit.edu 7.1-RELEASE-p5 FreeBSD 7.1-RELEASE-p5 #4: Thu Apr 23 13:36:41 EDT 2009 root@syn.csh.rit.edu:/usr/obj/usr/src/sys/GENERIC amd64 >Description: net-mgmt/nagios has a command injection vulnerability. I took a quick look at coming up with a patch in my limited time today but there are some patching issues with the existing things in files/patch*. I want to get this PR into the system so that the maintainer is aware of it and can work on a solution as time permits. The VuXML entry is available at: http://www.vuxml.org/freebsd/3ebd4cb5-657f-11de-883a-00e0815b8da8.html I've CC'ed the maintainer on this and will work with him to make sure an updated version hits the tree when it's ready. >How-To-Repeat: N/A >Fix: N/A >Release-Note: >Audit-Trail: >Unformatted: