openSUSE-OU-2018:2194-1: Optional package cacti
openSUSE Optional Update: Optional package cacti ______________________________________________________________________________ Announcement ID: openSUSE-OU-2018:2194-1 Rating: low References: #022564 #1047512 #1048102 #1050950 #1051633 #1054390 #1054742 #1067163 #1067164 #1067166 #1068028 #1101024 #1101139 #837440 #862993 #867607 #870821 #872008 #934187 #937997 #958863 #958977 #960678 #965930 #971357 #974013 Affected Products: SUSE Package Hub for SUSE Linux Enterprise 12 ______________________________________________________________________________ An update that fixes 33 vulnerabilities is now available. Description: This update introduces cacti to PackageHub: Cacti is a complete front-end to RRDtool, capable of taking care of generating graphs, data gathering and so on. Patch Instructions: To install this openSUSE Optional Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Package Hub for SUSE Linux Enterprise 12: zypper in -t patch openSUSE-2018-796=1 Package List: - SUSE Package Hub for SUSE Linux Enterprise 12 (noarch): cacti-1.1.38-2.1 cacti-doc-1.1.38-2.1 References: https://www.suse.com/security/cve/CVE-2006-6799.html https://www.suse.com/security/cve/CVE-2007-3112.html https://www.suse.com/security/cve/CVE-2007-3113.html https://www.suse.com/security/cve/CVE-2013-5588.html https://www.suse.com/security/cve/CVE-2013-5589.html https://www.suse.com/security/cve/CVE-2014-2326.html https://www.suse.com/security/cve/CVE-2014-2327.html https://www.suse.com/security/cve/CVE-2014-2328.html https://www.suse.com/security/cve/CVE-2014-2708.html https://www.suse.com/security/cve/CVE-2014-2709.html https://www.suse.com/security/cve/CVE-2014-4000.html https://www.suse.com/security/cve/CVE-2014-4002.html https://www.suse.com/security/cve/CVE-2014-5025.html https://www.suse.com/security/cve/CVE-2014-5026.html https://www.suse.com/security/cve/CVE-2015-4342.html https://www.suse.com/security/cve/CVE-2015-4634.html https://www.suse.com/security/cve/CVE-2015-8369.html https://www.suse.com/security/cve/CVE-2015-8377.html https://www.suse.com/security/cve/CVE-2015-8604.html https://www.suse.com/security/cve/CVE-2016-2313.html https://www.suse.com/security/cve/CVE-2016-3172.html https://www.suse.com/security/cve/CVE-2016-3659.html https://www.suse.com/security/cve/CVE-2017-10970.html https://www.suse.com/security/cve/CVE-2017-11163.html https://www.suse.com/security/cve/CVE-2017-11691.html https://www.suse.com/security/cve/CVE-2017-12065.html https://www.suse.com/security/cve/CVE-2017-12927.html https://www.suse.com/security/cve/CVE-2017-12978.html https://www.suse.com/security/cve/CVE-2017-15194.html https://www.suse.com/security/cve/CVE-2017-16641.html https://www.suse.com/security/cve/CVE-2017-16660.html https://www.suse.com/security/cve/CVE-2017-16661.html https://www.suse.com/security/cve/CVE-2017-16785.html https://bugzilla.suse.com/022564 https://bugzilla.suse.com/1047512 https://bugzilla.suse.com/1048102 https://bugzilla.suse.com/1050950 https://bugzilla.suse.com/1051633 https://bugzilla.suse.com/1054390 https://bugzilla.suse.com/1054742 https://bugzilla.suse.com/1067163 https://bugzilla.suse.com/1067164 https://bugzilla.suse.com/1067166 https://bugzilla.suse.com/1068028 https://bugzilla.suse.com/1101024 https://bugzilla.suse.com/1101139 https://bugzilla.suse.com/837440 https://bugzilla.suse.com/862993 https://bugzilla.suse.com/867607 https://bugzilla.suse.com/870821 https://bugzilla.suse.com/872008 https://bugzilla.suse.com/934187 https://bugzilla.suse.com/937997 https://bugzilla.suse.com/958863 https://bugzilla.suse.com/958977 https://bugzilla.suse.com/960678 https://bugzilla.suse.com/965930 https://bugzilla.suse.com/971357 https://bugzilla.suse.com/974013
participants (1)
-
maintenance@opensuse.org