You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa cacti, cacti-spine

Sigurnosni nedostaci programskog paketa cacti, cacti-spine

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

openSUSE Security Update: Security update for cacti, cacti-spine
______________________________________________________________________________

Announcement ID: openSUSE-SU-2020:1060-1
Rating: moderate
References: #1115436 #1154087 #1173090
Cross-References: CVE-2020-11022 CVE-2020-11023 CVE-2020-13625
CVE-2020-14295
Affected Products:
openSUSE Leap 15.2
openSUSE Leap 15.1
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________

An update that fixes four vulnerabilities is now available.

Description:

This update for cacti, cacti-spine fixes the following issues:

– cacti 1.2.13:

* Query XSS vulnerabilities require vendor package update
(CVE-2020-11022 / CVE-2020-11023)
* Lack of escaping on some pages can lead to XSS exposure
* Update PHPMailer to 6.1.6 (CVE-2020-13625)
* SQL Injection vulnerability due to input validation failure when
editing colors (CVE-2020-14295, boo#1173090)
* Lack of escaping on template import can lead to XSS exposure

– switch from cron to systemd timers (boo#1115436):
+ cacti-cron.timer
+ cacti-cron.service
– avoid potential root escalation on systems with fs.protected_hardlinks=0
(boo#1154087): handle directory permissions in file section instead
of using chown during post installation
– rewrote apache configuration to get rid of .htaccess files and
explicitely disable directory permissions per default (only allow a
limited, well-known set of directories)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 15.2:

zypper in -t patch openSUSE-2020-1060=1

– openSUSE Leap 15.1:

zypper in -t patch openSUSE-2020-1060=1

– SUSE Package Hub for SUSE Linux Enterprise 12:

zypper in -t patch openSUSE-2020-1060=1

Package List:

– openSUSE Leap 15.2 (noarch):

cacti-1.2.13-lp152.2.3.1

– openSUSE Leap 15.2 (x86_64):

cacti-spine-1.2.13-lp152.2.3.1
cacti-spine-debuginfo-1.2.13-lp152.2.3.1
cacti-spine-debugsource-1.2.13-lp152.2.3.1

– openSUSE Leap 15.1 (noarch):

cacti-1.2.13-lp151.3.12.1

– openSUSE Leap 15.1 (x86_64):

cacti-spine-1.2.13-lp151.3.12.1
cacti-spine-debuginfo-1.2.13-lp151.3.12.1
cacti-spine-debugsource-1.2.13-lp151.3.12.1

– SUSE Package Hub for SUSE Linux Enterprise 12 (aarch64 ppc64le s390x x86_64):

cacti-spine-1.2.13-8.1

– SUSE Package Hub for SUSE Linux Enterprise 12 (ppc64le x86_64):

cacti-spine-debuginfo-1.2.13-8.1
cacti-spine-debugsource-1.2.13-8.1

– SUSE Package Hub for SUSE Linux Enterprise 12 (noarch):

cacti-1.2.13-11.1

References:

https://www.suse.com/security/cve/CVE-2020-11022.html
https://www.suse.com/security/cve/CVE-2020-11023.html
https://www.suse.com/security/cve/CVE-2020-13625.html
https://www.suse.com/security/cve/CVE-2020-14295.html
https://bugzilla.suse.com/1115436
https://bugzilla.suse.com/1154087
https://bugzilla.suse.com/1173090


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

openSUSE Security Update: Security update for cacti, cacti-spine
______________________________________________________________________________

Announcement ID: openSUSE-SU-2020:1060-1
Rating: moderate
References: #1115436 #1154087 #1173090
Cross-References: CVE-2020-11022 CVE-2020-11023 CVE-2020-13625
CVE-2020-14295
Affected Products:
openSUSE Leap 15.2
openSUSE Leap 15.1
______________________________________________________________________________

An update that fixes four vulnerabilities is now available.

Description:

This update for cacti, cacti-spine fixes the following issues:

– cacti 1.2.13:

* Query XSS vulnerabilities require vendor package update
(CVE-2020-11022 / CVE-2020-11023)
* Lack of escaping on some pages can lead to XSS exposure
* Update PHPMailer to 6.1.6 (CVE-2020-13625)
* SQL Injection vulnerability due to input validation failure when
editing colors (CVE-2020-14295, boo#1173090)
* Lack of escaping on template import can lead to XSS exposure

– switch from cron to systemd timers (boo#1115436):
+ cacti-cron.timer
+ cacti-cron.service
– avoid potential root escalation on systems with fs.protected_hardlinks=0
(boo#1154087): handle directory permissions in file section instead
of using chown during post installation
– rewrote apache configuration to get rid of .htaccess files and
explicitely disable directory permissions per default (only allow a
limited, well-known set of directories)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 15.2:

zypper in -t patch openSUSE-2020-1060=1

– openSUSE Leap 15.1:

zypper in -t patch openSUSE-2020-1060=1

Package List:

– openSUSE Leap 15.2 (noarch):

cacti-1.2.13-lp152.2.3.1

– openSUSE Leap 15.2 (x86_64):

cacti-spine-1.2.13-lp152.2.3.1
cacti-spine-debuginfo-1.2.13-lp152.2.3.1
cacti-spine-debugsource-1.2.13-lp152.2.3.1

– openSUSE Leap 15.1 (noarch):

cacti-1.2.13-lp151.3.12.1

– openSUSE Leap 15.1 (x86_64):

cacti-spine-1.2.13-lp151.3.12.1
cacti-spine-debuginfo-1.2.13-lp151.3.12.1
cacti-spine-debugsource-1.2.13-lp151.3.12.1

References:

https://www.suse.com/security/cve/CVE-2020-11022.html
https://www.suse.com/security/cve/CVE-2020-11023.html
https://www.suse.com/security/cve/CVE-2020-13625.html
https://www.suse.com/security/cve/CVE-2020-14295.html
https://bugzilla.suse.com/1115436
https://bugzilla.suse.com/1154087
https://bugzilla.suse.com/1173090


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorGoran Culibrk
Cert idNCERT-REF-2020-07-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programske biblioteke LibVNCServer

Otkriveni su sigurnosni nedostaci u programskoj biblioteci LibVNCServer za operacijski sustav openSUSE. Otkriveni nedostaci potencijalnim napadačima omogućuju izvršavanje proizvoljnog programskog...

Close