drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in cacti-spine und cacti
Name: |
Mehrere Probleme in cacti-spine und cacti |
|
ID: |
openSUSE-SU-2020:1060-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
openSUSE Leap 15.1, openSUSE Leap 15.2 |
|
Datum: |
So, 26. Juli 2020, 09:59 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13625
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14295
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023 |
|
Applikationen: |
Cacti, Cacti |
|
Originalnachricht |
openSUSE Security Update: Security update for cacti, cacti-spine ______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:1060-1 Rating: moderate References: #1115436 #1154087 #1173090 Cross-References: CVE-2020-11022 CVE-2020-11023 CVE-2020-13625 CVE-2020-14295 Affected Products: openSUSE Leap 15.2 openSUSE Leap 15.1 ______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for cacti, cacti-spine fixes the following issues:
- cacti 1.2.13:
* Query XSS vulnerabilities require vendor package update (CVE-2020-11022 / CVE-2020-11023) * Lack of escaping on some pages can lead to XSS exposure * Update PHPMailer to 6.1.6 (CVE-2020-13625) * SQL Injection vulnerability due to input validation failure when editing colors (CVE-2020-14295, boo#1173090) * Lack of escaping on template import can lead to XSS exposure
- switch from cron to systemd timers (boo#1115436): + cacti-cron.timer + cacti-cron.service - avoid potential root escalation on systems with fs.protected_hardlinks=0 (boo#1154087): handle directory permissions in file section instead of using chown during post installation - rewrote apache configuration to get rid of .htaccess files and explicitely disable directory permissions per default (only allow a limited, well-known set of directories)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2020-1060=1
- openSUSE Leap 15.1:
zypper in -t patch openSUSE-2020-1060=1
Package List:
- openSUSE Leap 15.2 (noarch):
cacti-1.2.13-lp152.2.3.1
- openSUSE Leap 15.2 (x86_64):
cacti-spine-1.2.13-lp152.2.3.1 cacti-spine-debuginfo-1.2.13-lp152.2.3.1 cacti-spine-debugsource-1.2.13-lp152.2.3.1
- openSUSE Leap 15.1 (noarch):
cacti-1.2.13-lp151.3.12.1
- openSUSE Leap 15.1 (x86_64):
cacti-spine-1.2.13-lp151.3.12.1 cacti-spine-debuginfo-1.2.13-lp151.3.12.1 cacti-spine-debugsource-1.2.13-lp151.3.12.1
References:
https://www.suse.com/security/cve/CVE-2020-11022.html https://www.suse.com/security/cve/CVE-2020-11023.html https://www.suse.com/security/cve/CVE-2020-13625.html https://www.suse.com/security/cve/CVE-2020-14295.html https://bugzilla.suse.com/1115436 https://bugzilla.suse.com/1154087 https://bugzilla.suse.com/1173090
-- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
|
|
|
|