---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv ---------------------------------------------------------------------- TITLE: Fedora update for nagios SECUNIA ADVISORY ID: SA27980 VERIFY ADVISORY: http://secunia.com/advisories/27980/ CRITICAL: Less critical IMPACT: Cross Site Scripting WHERE: >From remote OPERATING SYSTEM: Fedora 7 http://secunia.com/product/15552/ Fedora 8 http://secunia.com/product/16769/ DESCRIPTION: Fedora has issued an update for nagios. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. For more information: SA27316 SOLUTION: Apply updated packages. -- Fedora 7 -- 81a09c13426f60076844496abc54dfbbb84cf7eb nagios-2.10-3.fc7.ppc64.rpm 5a67dea82d753a85bd8329a0e4462308af1bfa4e nagios-devel-2.10-3.fc7.ppc64.rpm fdcf9b005c71e13bab0b0ae15ead14a116663572 nagios-debuginfo-2.10-3.fc7.ppc64.rpm 796b3f95e7bcf124d67b070f0ebb760fac94b586 nagios-debuginfo-2.10-3.fc7.i386.rpm 7a2750b4b308fcd4e918f512dde840cbec40f575 nagios-2.10-3.fc7.i386.rpm dbf21db3daf78190c891300e3b073c7204030549 nagios-devel-2.10-3.fc7.i386.rpm f6c41af4c271858928caceef6147cf03c3df0947 nagios-devel-2.10-3.fc7.x86_64.rpm c8f6a68c6dc38347553a03ea672837322a9fe772 nagios-2.10-3.fc7.x86_64.rpm 846ccdd5400f7cc834150de8965708aa31a9d6e7 nagios-debuginfo-2.10-3.fc7.x86_64.rpm c8245be56d2ecc43ff8f69bc81dfd077cc7c8731 nagios-debuginfo-2.10-3.fc7.ppc.rpm 11f80539b413951ea1598425194294782075b920 nagios-devel-2.10-3.fc7.ppc.rpm 3fb7387e9f8277ca3e85c3f8f747df7112f24c2d nagios-2.10-3.fc7.ppc.rpm 2b7b4c15444d0ace086815e9905241fc2742d639 nagios-2.10-3.fc7.src.rpm --Fedora 8 -- dfa0e93649e7ae91a188d5f5ed846bbad345d8c5 nagios-devel-2.10-5.fc8.ppc64.rpm 0d236c39b28fbb23a99632fbeddb19d5aa457b9c nagios-2.10-5.fc8.ppc64.rpm 2bb8c06e52877db4818e32267574c523f030dbb7 nagios-debuginfo-2.10-5.fc8.ppc64.rpm 02203817100c0fb73ef114702bd1cb2aed1df116 nagios-debuginfo-2.10-5.fc8.i386.rpm 886052ac7e878d775cac126fc8fbf33d25385482 nagios-2.10-5.fc8.i386.rpm 5dfb9324802679d3f436ccb2dac559a3ef74f96b nagios-devel-2.10-5.fc8.i386.rpm b71fcb8d64aef084a9b233cb24a4f1e93d47cbb4 nagios-devel-2.10-5.fc8.x86_64.rpm be6c567b772d86482ba4fa5fea54bcb57850fce0 nagios-debuginfo-2.10-5.fc8.x86_64.rpm c6a636ba408d8a61c85caf0c356e0f737f72eb6e nagios-2.10-5.fc8.x86_64.rpm f2c3ce7056d1ffbc19bf19ae6e86624a193d4402 nagios-debuginfo-2.10-5.fc8.ppc.rpm 6f82709e701f6e4461b807910001d1f1052fa132 nagios-2.10-5.fc8.ppc.rpm f747b6822a5fe247c577b6d35d6d0b485551bec1 nagios-devel-2.10-5.fc8.ppc.rpm 4678abaa571a8f049dca20ca7aff25af515ed792 nagios-2.10-5.fc8.src.rpm ORIGINAL ADVISORY: https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00125.html https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00161.html OTHER REFERENCES: SA27316: http://secunia.com/advisories/27316/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------