-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2653-1 security@debian.org http://www.debian.org/security/ Florian Weimer March 26, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : icinga Vulnerability : buffer overflow Problem type : remote Debian-specific: no CVE ID : CVE-2012-6096 Debian Bug : 697931 It was discovered that Icinga, a host and network monitoring system, contains several buffer overflows in the history.cgi CGI program. For the stable distribution (squeeze), this problem has been fixed in version 1.0.2-2+squeeze1. For the testing distribution (wheezy), this problem has been fixed in version 1.7.1-5. For the unstable distribution (sid), this problem has been fixed in version 1.7.1-5. We recommend that you upgrade your icinga packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQEcBAEBAgAGBQJRUgT+AAoJEL97/wQC1SS+h4oIAKTl/sTEJGoNuw68I2mk+GPj zDHZQedpaT6tS6zoq1EJtKegvmRm9aqp0tLOds0p9DR+1Z8lzZyks2me00wFPxj8 pYNiA0/udLXcbrOoxbKNasd6RWqEVoIQwaZeQvnqWyVWIJ2RZ/QfYwyTvEYs0Gvw H/p8Ebqe6Ix486ARGH7iBna50yi/h9WfSIrnrwcU8Kw205/UruIOsb+7fIGA7SWu AYLUXlZ5zgqyMiBgSdbtuU9T/s4O6m6Ip6VUiA22olmubctfKVKTK4OK+E+Ld9eq AB8cDfcO2CjtUvG2c+k1kYS67QkBcKlRM0xMcbBtekGZxgBV1NPSiVZKo+EjXjk= =Zoin -----END PGP SIGNATURE-----