First published: Tue Apr 30 2013(Updated: )
+++ This bug was initially created as a clone of <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - CVE-2013-4214 Nagios core: html/rss-newsfeed.php insecure temporary file usage" href="show_bug.cgi?id=958002">Bug #958002</a> +++ +++ This bug was initially created as a clone of <a class="bz_bug_link bz_secure " title="" href="show_bug.cgi?id=957481">Bug #957481</a> +++ Warning: nagios-3.4.4-1.el6ost/nagios.upgrade_to_v3.sh Tempfile is created by using $$ should use mktemp instead. tmp1=/tmp/nagioscfg.$$.tmp --- Additional comment from Kurt Seifried on 2013-04-30 03:19:10 EDT --- nagios.upgrade_to_v3.sh is not in upstreams files, it's added by Red Hat and several other vendors. So splitting this bug again.
Affected Software | Affected Version | How to fix |
---|---|---|
Nagios Plugins |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-958015 is categorized as a moderate risk.
To fix REDHAT-BUG-958015, update the Nagios plugins to the latest patched version.
The software affected by REDHAT-BUG-958015 is Nagios and its associated plugins.
REDHAT-BUG-958015 is related to insecure temporary file usage in the Nagios core.
Currently, there is no official workaround for REDHAT-BUG-958015; the best practice is to apply the available updates.