nagios-nrpe (2.15-1ubuntu1.1) xenial; urgency=medium

  * debian/rules : Add "--enable-command-args". (LP: #1555258)
    This update enables the command-args support in nrpe
    by not ignoring option "dont_blame_nrpe=1". By default,
    the option is set as follow : "dont_blame_nrpe=0", which
    has the same effect of having the command-args support
    disabled at compile time like Debian does. Ubuntu has decided
    to deviate from Debian upstream for that particular case to
    allow/unblock the Ubuntu users of nrpe to make the choice for
    themselves whether to accept the security risks that the feature
    involve by manually enabling command-args in nrpe.cfg or not.
    For more details as of why Debian has decided to disable the
    feature can be found in debian/NEWS. (closes: #756479)

  * [5bf9b20] Add 10_remote_execution_exploit_fix.dpatch patch (LP: #1555258)
    As requested by the security team.

Date: Tue, 02 May 2017 14:21:47 -0400
Changed-By: Eric Desrochers <eric.desroch...@canonical.com>
Maintainer: Ubuntu Developers <ubuntu-de...@lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/nagios-nrpe/2.15-1ubuntu1.1
Format: 1.8
Date: Tue, 02 May 2017 14:21:47 -0400
Source: nagios-nrpe
Binary: nagios-nrpe-server nagios-nrpe-plugin
Architecture: source
Version: 2.15-1ubuntu1.1
Distribution: xenial
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-de...@lists.ubuntu.com>
Changed-By: Eric Desrochers <eric.desroch...@canonical.com>
Description:
 nagios-nrpe-plugin - Nagios Remote Plugin Executor Plugin
 nagios-nrpe-server - Nagios Remote Plugin Executor Server
Closes: 756479
Launchpad-Bugs-Fixed: 1555258
Changes:
 nagios-nrpe (2.15-1ubuntu1.1) xenial; urgency=medium
 .
   * debian/rules : Add "--enable-command-args". (LP: #1555258)
     This update enables the command-args support in nrpe
     by not ignoring option "dont_blame_nrpe=1". By default,
     the option is set as follow : "dont_blame_nrpe=0", which
     has the same effect of having the command-args support
     disabled at compile time like Debian does. Ubuntu has decided
     to deviate from Debian upstream for that particular case to
     allow/unblock the Ubuntu users of nrpe to make the choice for
     themselves whether to accept the security risks that the feature
     involve by manually enabling command-args in nrpe.cfg or not.
     For more details as of why Debian has decided to disable the
     feature can be found in debian/NEWS. (closes: #756479)
 .
   * [5bf9b20] Add 10_remote_execution_exploit_fix.dpatch patch (LP: #1555258)
     As requested by the security team.
Checksums-Sha1:
 85f59d695b4c08085c8d2d70e7e96be2200727ed 1744 nagios-nrpe_2.15-1ubuntu1.1.dsc
 f41a68e22f19db4378ec4dd7c7df704c5d075115 13250 
nagios-nrpe_2.15-1ubuntu1.1.diff.gz
Checksums-Sha256:
 077237191ba616b1ad3e423d8d3b04175abac3bc2ec2a4b4e00fa1b87278e39c 1744 
nagios-nrpe_2.15-1ubuntu1.1.dsc
 4e517b55286afe07280d3b722fd67f1b06ef1c73e7cab14d261a1fa666665baa 13250 
nagios-nrpe_2.15-1ubuntu1.1.diff.gz
Files:
 e58bd302360245659981a50600fcf1df 1744 net optional 
nagios-nrpe_2.15-1ubuntu1.1.dsc
 b5e4343185c31787fd42c19f1d1cb0aa 13250 net optional 
nagios-nrpe_2.15-1ubuntu1.1.diff.gz
Original-Maintainer: Debian Nagios Maintainer Group 
<pkg-nagios-de...@lists.alioth.debian.org>
-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes

Reply via email to