Since this issue has been rated as having a "low" priority, it will only
get fixed when a more important security issue comes up.

Tracked here:
http://people.canonical.com/~ubuntu-security/cve/2013/CVE-2013-1362.html

** Information type changed from Private Security to Public Security

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-1362

** Also affects: nagios-nrpe (Ubuntu Lucid)
   Importance: Undecided
       Status: New

** Also affects: nagios-nrpe (Ubuntu Oneiric)
   Importance: Undecided
       Status: New

** Also affects: nagios-nrpe (Ubuntu Precise)
   Importance: Undecided
       Status: New

** Also affects: nagios-nrpe (Ubuntu Raring)
   Importance: Undecided
       Status: New

** Also affects: nagios-nrpe (Ubuntu Quantal)
   Importance: Undecided
       Status: New

** Changed in: nagios-nrpe (Ubuntu Lucid)
       Status: New => Confirmed

** Changed in: nagios-nrpe (Ubuntu Oneiric)
       Status: New => Confirmed

** Changed in: nagios-nrpe (Ubuntu Precise)
       Status: New => Confirmed

** Changed in: nagios-nrpe (Ubuntu Raring)
       Status: New => Confirmed

** Changed in: nagios-nrpe (Ubuntu Quantal)
       Status: New => Confirmed

** Changed in: nagios-nrpe (Ubuntu Oneiric)
   Importance: Undecided => Low

** Changed in: nagios-nrpe (Ubuntu Precise)
   Importance: Undecided => Low

** Changed in: nagios-nrpe (Ubuntu Quantal)
   Importance: Undecided => Low

** Changed in: nagios-nrpe (Ubuntu Raring)
   Importance: Undecided => Low

** Changed in: nagios-nrpe (Ubuntu Lucid)
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1153638

Title:
  nrpe allows the passing of $() as command arguments to execute shell
  commands

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nagios-nrpe/+bug/1153638/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to