You are here
Home > Preporuke > Sigurnosni propusti programskog paketa zabix

Sigurnosni propusti programskog paketa zabix

  • Detalji os-a: FED
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2014-5551
2014-04-24 06:41:59
——————————————————————————–

Name : zabbix
Product : Fedora 19
Version : 2.0.11
Release : 3.fc19
URL : http://www.zabbix.com
Summary : Open-source monitoring solution for your IT infrastructure
Description :
Zabbix is software that monitors numerous parameters of a network and the
health and integrity of servers. Zabbix uses a flexible notification mechanism
that allows users to configure e-mail based alerts for virtually any event.
This allows a fast reaction to server problems. Zabbix offers excellent
reporting and data visualization features based on the stored data.
This makes Zabbix ideal for capacity planning.

Zabbix supports both polling and trapping. All Zabbix reports and statistics,
as well as configuration parameters are accessed through a web-based front end.
A web-based front end ensures that the status of your network and the health of
your servers can be assessed from any location. Properly configured, Zabbix can
play an important role in monitoring IT infrastructure. This is equally true
for small organizations with a few servers and for large companies with a
multitude of servers.

——————————————————————————–
Update Information:

The logrotate configuration had no su statement in 2.0.11-2. Furthermore, the log file should have been created as zabbixsrv:zabbix for the proxy and server, what they are now.

http://www.zabbix.com/rn2.0.11.php

Also solves 3 security issues:

* [ZBX-7703] fixed being able to switch users without proper credentials
when using HTTP authentication; reference CVE-2014-1682

* [ZBX-6721] fixed LDAP authentication; reference CVE-2013-5572
* [ZBX-7693] fixed admin user being able to update media for other users;
reference CVE-2014-1685
——————————————————————————–
ChangeLog:

* Tue Apr 22 2014 Volker Fröhlich <volker27@gmx.at> – 2.0.11-3
– Don’t remove su directive from logrotate config in error
– Adapt logrotate.in file and sed invocation from 2.2 packages
* Sun Feb 16 2014 Volker Fröhlich <volker27@gmx.at> – 2.0.11-2
– Remove if clauses for Fedora/RHEL as they are obsolete in EL 7
– Use systemd scriplet macros (BZ#850378)
– Remove init scripts
* Wed Feb 12 2014 Volker Fröhlich <volker27@gmx.at> – 2.0.11-1
– New upstream release
– Truncate changelog
* Sun Dec 15 2013 Volker Fröhlich <volker27@gmx.at> – 2.0.10-2
– The start function of the proxy init script had a typo causing failure
– Improved the section on running multiple instances in the README
* Fri Dec 13 2013 Volker Fröhlich <volker27@gmx.at> – 2.0.10-1
– New upstream release
– Drop obsolete patch ZBX-7479
– Improve init scripts to not kill other instances (BZ#1018293)
– General overhaul of init scripts and documentation in README
– Harmonize scriptlet if-clause style
* Sun Nov 3 2013 Volker Fröhlich <volker27@gmx.at> – 2.0.9-2
– Fix vulnerability for remote command execution injection
(ZBX-7479, CVE-2013-6824)
* Wed Oct 9 2013 Volker Fröhlich <volker27@gmx.at> – 2.0.9-1
– New upstream release
– Drop obsolete patches ZBX-6804, ZBX-7091, ZBX-6922, ZBX-6992
* Thu Oct 3 2013 Volker Fröhlich <volker27@gmx.at> – 2.0.8-3
– Add SQL speed-up patch (ZBX-6804)
– Add SQL injection vulnerability patch (ZBX-7091, CVE-2013-5743)
– Add patch for failing XML host import (ZBX-6922)
* Fri Sep 13 2013 Volker Fröhlich <volker27@gmx.at> – 2.0.8-2
– Add php-ldap as a requirement for the frontend
– Add patch for ZBX-6992
* Fri Aug 23 2013 Volker Fröhlich <volker27@gmx.at> – 2.0.8-1
– New upstream release
– Create and configure a spooling directory for fping files outside of /tmp
– Update README to reflect that and add a SELinux section
– Drop PrivateTmp from systemd unit files
– Drop patch for ZBX-6526 (solved upstream)
– Drop patch for CVE-2012-6086 (solved upstream)
– Correct path for the flash applet when removing
– Truncate changelog
* Tue Jul 30 2013 Volker Fröhlich <volker27@gmx.at> – 2.0.6-3
– Backport fix for CVE-2012-6086
——————————————————————————–
References:

[ 1 ] Bug #1013963 – CVE-2013-5572 zabbix: password leakage
https://bugzilla.redhat.com/show_bug.cgi?id=1013963
[ 2 ] Bug #1061563 – CVE-2014-1682 zabbix: API issue allows users to impersonate other users
https://bugzilla.redhat.com/show_bug.cgi?id=1061563
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update zabbix’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2014-5540
2014-04-24 06:41:34
——————————————————————————–

Name : zabbix
Product : Fedora 20
Version : 2.0.11
Release : 3.fc20
URL : http://www.zabbix.com
Summary : Open-source monitoring solution for your IT infrastructure
Description :
Zabbix is software that monitors numerous parameters of a network and the
health and integrity of servers. Zabbix uses a flexible notification mechanism
that allows users to configure e-mail based alerts for virtually any event.
This allows a fast reaction to server problems. Zabbix offers excellent
reporting and data visualization features based on the stored data.
This makes Zabbix ideal for capacity planning.

Zabbix supports both polling and trapping. All Zabbix reports and statistics,
as well as configuration parameters are accessed through a web-based front end.
A web-based front end ensures that the status of your network and the health of
your servers can be assessed from any location. Properly configured, Zabbix can
play an important role in monitoring IT infrastructure. This is equally true
for small organizations with a few servers and for large companies with a
multitude of servers.

——————————————————————————–
Update Information:

The logrotate configuration had no su statement in 2.0.11-2. Furthermore, the log file should have been created as zabbixsrv:zabbix for the proxy and server, what they are now.

http://www.zabbix.com/rn2.0.11.php

Also solves 3 security issues:

* [ZBX-7703] fixed being able to switch users without proper credentials
when using HTTP authentication; reference CVE-2014-1682

* [ZBX-6721] fixed LDAP authentication; reference CVE-2013-5572
* [ZBX-7693] fixed admin user being able to update media for other users;
reference CVE-2014-1685
——————————————————————————–
ChangeLog:

* Tue Apr 22 2014 Volker Fröhlich <volker27@gmx.at> – 2.0.11-3
– Don’t remove su directive from logrotate config in error
– Adapt logrotate.in file and sed invocation from 2.2 packages
* Sun Feb 16 2014 Volker Fröhlich <volker27@gmx.at> – 2.0.11-2
– Remove if clauses for Fedora/RHEL as they are obsolete in EL 7
– Use systemd scriplet macros (BZ#850378)
– Remove init scripts
* Wed Feb 12 2014 Volker Fröhlich <volker27@gmx.at> – 2.0.11-1
– New upstream release
– Truncate changelog
* Sun Dec 15 2013 Volker Fröhlich <volker27@gmx.at> – 2.0.10-2
– The start function of the proxy init script had a typo causing failure
– Improved the section on running multiple instances in the README
* Fri Dec 13 2013 Volker Fröhlich <volker27@gmx.at> – 2.0.10-1
– New upstream release
– Drop obsolete patch ZBX-7479
– Improve init scripts to not kill other instances (BZ#1018293)
– General overhaul of init scripts and documentation in README
– Harmonize scriptlet if-clause style
* Sun Nov 3 2013 Volker Fröhlich <volker27@gmx.at> – 2.0.9-2
– Fix vulnerability for remote command execution injection
(ZBX-7479, CVE-2013-6824)
——————————————————————————–
References:

[ 1 ] Bug #1013963 – CVE-2013-5572 zabbix: password leakage
https://bugzilla.redhat.com/show_bug.cgi?id=1013963
[ 2 ] Bug #1061563 – CVE-2014-1682 zabbix: API issue allows users to impersonate other users
https://bugzilla.redhat.com/show_bug.cgi?id=1061563
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update zabbix’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
7e

AutorTomislav Protega
Cert idNCERT-REF-2014-05-0001-ADV
CveCVE-2014-1682 CVE-2013-5572 CVE-2014-1685 CVE-2013-6824 CVE-2013-5743 CVE-2012-6086
ID izvornikaFEDORA-2014-5551 FEDORA-2014-5540
Proizvodzabbix
Izvorhttp://www.redhat.com
Top
More in Preporuke
Nadogradnja za openjdk-6

Izdana je nadogradnja koja otklanja mnogobrojne ranjivosti u radu programskog paketa openjdk-6 za Ubuntu 10.04 LTS i 12.04 LTS. Ranjivosti...

Close