openSUSE-SU-2020:1060-1: moderate: Security update for cacti, cacti-spine
openSUSE Security Update: Security update for cacti, cacti-spine ______________________________________________________________________________ Announcement ID: openSUSE-SU-2020:1060-1 Rating: moderate References: #1115436 #1154087 #1173090 Cross-References: CVE-2020-11022 CVE-2020-11023 CVE-2020-13625 CVE-2020-14295 Affected Products: openSUSE Leap 15.2 openSUSE Leap 15.1 SUSE Package Hub for SUSE Linux Enterprise 12 ______________________________________________________________________________ An update that fixes four vulnerabilities is now available. Description: This update for cacti, cacti-spine fixes the following issues: - cacti 1.2.13: * Query XSS vulnerabilities require vendor package update (CVE-2020-11022 / CVE-2020-11023) * Lack of escaping on some pages can lead to XSS exposure * Update PHPMailer to 6.1.6 (CVE-2020-13625) * SQL Injection vulnerability due to input validation failure when editing colors (CVE-2020-14295, boo#1173090) * Lack of escaping on template import can lead to XSS exposure - switch from cron to systemd timers (boo#1115436): + cacti-cron.timer + cacti-cron.service - avoid potential root escalation on systems with fs.protected_hardlinks=0 (boo#1154087): handle directory permissions in file section instead of using chown during post installation - rewrote apache configuration to get rid of .htaccess files and explicitely disable directory permissions per default (only allow a limited, well-known set of directories) Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.2: zypper in -t patch openSUSE-2020-1060=1 - openSUSE Leap 15.1: zypper in -t patch openSUSE-2020-1060=1 - SUSE Package Hub for SUSE Linux Enterprise 12: zypper in -t patch openSUSE-2020-1060=1 Package List: - openSUSE Leap 15.2 (noarch): cacti-1.2.13-lp152.2.3.1 - openSUSE Leap 15.2 (x86_64): cacti-spine-1.2.13-lp152.2.3.1 cacti-spine-debuginfo-1.2.13-lp152.2.3.1 cacti-spine-debugsource-1.2.13-lp152.2.3.1 - openSUSE Leap 15.1 (noarch): cacti-1.2.13-lp151.3.12.1 - openSUSE Leap 15.1 (x86_64): cacti-spine-1.2.13-lp151.3.12.1 cacti-spine-debuginfo-1.2.13-lp151.3.12.1 cacti-spine-debugsource-1.2.13-lp151.3.12.1 - SUSE Package Hub for SUSE Linux Enterprise 12 (aarch64 ppc64le s390x x86_64): cacti-spine-1.2.13-8.1 - SUSE Package Hub for SUSE Linux Enterprise 12 (ppc64le x86_64): cacti-spine-debuginfo-1.2.13-8.1 cacti-spine-debugsource-1.2.13-8.1 - SUSE Package Hub for SUSE Linux Enterprise 12 (noarch): cacti-1.2.13-11.1 References: https://www.suse.com/security/cve/CVE-2020-11022.html https://www.suse.com/security/cve/CVE-2020-11023.html https://www.suse.com/security/cve/CVE-2020-13625.html https://www.suse.com/security/cve/CVE-2020-14295.html https://bugzilla.suse.com/1115436 https://bugzilla.suse.com/1154087 https://bugzilla.suse.com/1173090
participants (1)
-
opensuse-security@opensuse.org