Fedora 32: glpi FEDORA-2020-ee30e1109f
Summary
GLPI is the Information Resource-Manager with an additional Administration-Interface. You can use it to build up a database with an inventory for your
company (computer, software, printers...). It has enhanced functions to make
the daily life for the administrators easier, like a job-tracking-system with
mail-notification and methods to build a database with basic information
about your network-topology.
Last Upstream release, including (among others): - (security) Prevent execution
of SQL injection while assigning a technician, - (security) Permit to change key
used to store passwords, - (security) Improve CSRF token, - (security) Fix
several possible XSS, - (security) Fix a few possible SQL injections, - Fix SCSS
caching issues, - Fix inline images handling on item update, - Fix PHP 7.4
compatibility, - Connect to database using socket, - ... Full changelog at
https://github.com/glpi-project/glpi/milestone/39?closed=1
* Tue May 5 2020 Johan Cwiklinski
- update to 9.4.6
- drop patches applied upstream
[ 1 ] Bug #1834489 - CVE-2020-11033 glpi: any API user with READ right on User itemtype will have access to full list of users when querying apirest.php/User [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1834489
[ 2 ] Bug #1834492 - CVE-2020-11036 glpi: XSS in the comments of items in the knowledge base and via the User-Agent for administrators [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1834492
[ 3 ] Bug #1834498 - CVE-2020-11035 glpi: CSRF tokens are generated using an insecure algorithm [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1834498
[ 4 ] Bug #1834505 - CVE-2020-11034 glpi: bypass open redirect protection based on a regexp [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1834505
su -c 'dnf upgrade --advisory FEDORA-2020-ee30e1109f' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/
FEDORA-2020-ee30e1109f 2020-05-14 02:35:07.837945 Product : Fedora 32 Version : 9.4.6 Release : 1.fc32 URL : https://glpi-project.org/ Summary : Free IT asset management software Description : GLPI is the Information Resource-Manager with an additional Administration-Interface. You can use it to build up a database with an inventory for your company (computer, software, printers...). It has enhanced functions to make the daily life for the administrators easier, like a job-tracking-system with mail-notification and methods to build a database with basic information about your network-topology. Last Upstream release, including (among others): - (security) Prevent execution of SQL injection while assigning a technician, - (security) Permit to change key used to store passwords, - (security) Improve CSRF token, - (security) Fix several possible XSS, - (security) Fix a few possible SQL injections, - Fix SCSS caching issues, - Fix inline images handling on item update, - Fix PHP 7.4 compatibility, - Connect to database using socket, - ... Full changelog at https://github.com/glpi-project/glpi/milestone/39?closed=1 * Tue May 5 2020 Johan Cwiklinski - 9.4.6-1 - update to 9.4.6 - drop patches applied upstream [ 1 ] Bug #1834489 - CVE-2020-11033 glpi: any API user with READ right on User itemtype will have access to full list of users when querying apirest.php/User [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1834489 [ 2 ] Bug #1834492 - CVE-2020-11036 glpi: XSS in the comments of items in the knowledge base and via the User-Agent for administrators [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1834492 [ 3 ] Bug #1834498 - CVE-2020-11035 glpi: CSRF tokens are generated using an insecure algorithm [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1834498 [ 4 ] Bug #1834505 - CVE-2020-11034 glpi: bypass open redirect protection based on a regexp [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1834505 su -c 'dnf upgrade --advisory FEDORA-2020-ee30e1109f' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/
Change Log
References