openSUSE: 2021:0787-1 important: cacti, cacti-spine

Advisories


   openSUSE Security Update: Security update for cacti, cacti-spine
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2021:0787-1
Rating:             important
References:         #1180804 
Cross-References:   CVE-2020-35701
CVSS scores:
                    CVE-2020-35701 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:
                    openSUSE Backports SLE-15-SP2
______________________________________________________________________________

   An update that fixes one vulnerability is now available.

Description:

   This update for cacti, cacti-spine fixes the following issues:

   cacti-spine was updated to 1.2.17:

   * Avoid triggering DDos detection in firewalls on large systems
   * Use mysql reconnect option properly
   * Fix possible creashes in various operations
   * Fix remote data collectors pushing too much data to main when performing
     diagnostics
   * Make spine more responsive when remote connection is down
   * Fix various MySQL issues
   * Make spine immune to DST changes

   cacti-spine 1.2.16:

   * Some developer debug log messages falsely labeled as WARNINGS
   * Remove the need of the dos2unix program
   * Fix Spine experiencing MySQL socket error 2002 under load
   * Under heavy load MySQL/MariaDB return 2006 and 2013 errors on query
   * Add backtrace output to stderr for signals
   * Add Data Source turnaround time to debug output

   cacti-spine 1.2.15:

   * Special characters may not always be ignored properly


   cacti was updated to 1.2.17:

   * Fix incorrect handling of fields led to potential XSS issues
   * CVE-2020-35701: Fix SQL Injection vulnerability (boo#1180804)
   * Fix various XSS issues with HTML Forms handling
   * Fix handling of Daylight Saving Time changes
   * Multiple fixes and extensions to plugins
   * Fix multiple display, export, and input validation issues
   * SNMPv3 Password field was not correctly limited
   * Improved regular expression handling for searcu
   * Improved support for RRDproxy
   * Improved behavior on large systems
   * MariaDB/MysQL: Support persistent connections and improve multiple
     operations and options
   * Add Theme 'Midwinter'
   * Modify automation to test for data before creating graphs
   * Add hooks for plugins to show customize graph source and customize
     template url
   * Allow CSRF security key to be refreshed at command line
   * Allow remote pollers statistics to be cleared
   * Allow user to be automatically logged out after admin defined period
   * When replicating, ensure Cacti can detect and verify replica servers


   This update was imported from the openSUSE:Leap:15.2:Update update project.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Backports SLE-15-SP2:

      zypper in -t patch openSUSE-2021-787=1



Package List:

   - openSUSE Backports SLE-15-SP2 (aarch64 ppc64le s390x x86_64):

      cacti-spine-1.2.17-bp152.2.7.1

   - openSUSE Backports SLE-15-SP2 (noarch):

      cacti-1.2.17-bp152.2.10.1


References:

   https://www.suse.com/security/cve/CVE-2020-35701.html
   https://bugzilla.suse.com/1180804

openSUSE: 2021:0787-1 important: cacti, cacti-spine

May 24, 2021
An update that fixes one vulnerability is now available

Description

This update for cacti, cacti-spine fixes the following issues: cacti-spine was updated to 1.2.17: * Avoid triggering DDos detection in firewalls on large systems * Use mysql reconnect option properly * Fix possible creashes in various operations * Fix remote data collectors pushing too much data to main when performing diagnostics * Make spine more responsive when remote connection is down * Fix various MySQL issues * Make spine immune to DST changes cacti-spine 1.2.16: * Some developer debug log messages falsely labeled as WARNINGS * Remove the need of the dos2unix program * Fix Spine experiencing MySQL socket error 2002 under load * Under heavy load MySQL/MariaDB return 2006 and 2013 errors on query * Add backtrace output to stderr for signals * Add Data Source turnaround time to debug output cacti-spine 1.2.15: * Special characters may not always be ignored properly cacti was updated to 1.2.17: * Fix incorrect handling of fields led to potential XSS issues * CVE-2020-35701: Fix SQL Injection vulnerability (boo#1180804) * Fix various XSS issues with HTML Forms handling * Fix handling of Daylight Saving Time changes * Multiple fixes and extensions to plugins * Fix multiple display, export, and input validation issues * SNMPv3 Password field was not correctly limited * Improved regular expression handling for searcu * Improved support for RRDproxy * Improved behavior on large systems * MariaDB/MysQL: Support persistent connections and improve multiple operations and options * Add Theme 'Midwinter' * Modify automation to test for data before creating graphs * Add hooks for plugins to show customize graph source and customize template url * Allow CSRF security key to be refreshed at command line * Allow remote pollers statistics to be cleared * Allow user to be automatically logged out after admin defined period * When replicating, ensure Cacti can detect and verify replica servers This update was imported from the openSUSE:Leap:15.2:Update update project.

Patch

To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP2: zypper in -t patch openSUSE-2021-787=1

Package List

- openSUSE Backports SLE-15-SP2 (aarch64 ppc64le s390x x86_64): cacti-spine-1.2.17-bp152.2.7.1 - openSUSE Backports SLE-15-SP2 (noarch): cacti-1.2.17-bp152.2.10.1

References

https://www.suse.com/security/cve/CVE-2020-35701.html https://bugzilla.suse.com/1180804

Severity
Announcement ID: openSUSE-SU-2021:0787-1
Rating: important
Affected Products: openSUSE Backports SLE-15-SP2 .

Related News

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.