Your message dated Fri, 11 Jun 2010 19:17:10 +0000
with message-id <[email protected]>
and subject line Bug#582691: fixed in cacti 0.8.7e-4
has caused the Debian Bug report #582691,
regarding Multiple security vulnerabilities in upstream package
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
582691: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=582691
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: cacti
Version: 0.8.7b-2.1+lenny2
Tags: security
Severity: critical
The producers of cacti have reported multiple high-threat security
vulnerabilities in this version of cacti.
Relevant release notes for v0.8.7f below:
http://www.cacti.net/release_notes_0_8_7f.php
Important Security Fixes
SQL injection and shell escaping issues reported by Bonsai Information
Security (http://www.bonsai-sec.com)
Cross-site scripting issues reported by VUPEN Security (http://www.vupen.com)
MOPS-2010-023: Cacti Graph Viewer SQL Injection Vulnerability
(http://php-security.org)
MOPS-2010-023 reports that versions of cacti prior to and including
0.8.7e are vulnerable to this attack. The changelog for this version
of cacti is dated prior to the release of MOPS-2010-023 vulnerability,
which suggests that 0.87b-2.1+lenny2 may still be vulnerable. I note
that the last security change was in templates_export.php; the new
threat is in graph.php, so I suspect this hole was not closed in the
last security backport.
--- End Message ---
--- Begin Message ---
Source: cacti
Source-Version: 0.8.7e-4
We believe that the bug you reported is fixed in the latest version of
cacti, which is due to be installed in the Debian FTP archive:
cacti_0.8.7e-4.diff.gz
to main/c/cacti/cacti_0.8.7e-4.diff.gz
cacti_0.8.7e-4.dsc
to main/c/cacti/cacti_0.8.7e-4.dsc
cacti_0.8.7e-4_all.deb
to main/c/cacti/cacti_0.8.7e-4_all.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Sean Finney <[email protected]> (supplier of updated cacti package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Fri, 11 Jun 2010 21:08:02 +0000
Source: cacti
Binary: cacti
Architecture: source all
Version: 0.8.7e-4
Distribution: unstable
Urgency: high
Maintainer: Sean Finney <[email protected]>
Changed-By: Sean Finney <[email protected]>
Description:
cacti - Frontend to rrdtool for monitoring systems and services
Closes: 582691
Changes:
cacti (0.8.7e-4) unstable; urgency=high
.
* Forward-port fix for CVE-2010-2092 from stable package (Closes: #582691)
Checksums-Sha1:
d51a68aaa1ee6ac526cc88806ecc4bdfa14c4ed6 1113 cacti_0.8.7e-4.dsc
915eed8bad812f208d95a47f5d044a2d8616b0ba 43472 cacti_0.8.7e-4.diff.gz
572e882682e309ea05ff5617ac9e7cfc4bb8c96b 2091656 cacti_0.8.7e-4_all.deb
Checksums-Sha256:
d03a807ff6eabe213e283ca9f2a3132ba26af66da53e5e2b3beb3aafbf91205f 1113
cacti_0.8.7e-4.dsc
c5efd579412d3787a19513b51c57fa00fedb548972860cf40cae0f16705579a5 43472
cacti_0.8.7e-4.diff.gz
a1e9b8de37dd5ef20db3d5d4061c7c390e822027066264ac3fa52669ceb6e3bd 2091656
cacti_0.8.7e-4_all.deb
Files:
6140a88d6096208feef52d959077e7a0 1113 web extra cacti_0.8.7e-4.dsc
2a908a11c79ce3b2b9877ee29cc45744 43472 web extra cacti_0.8.7e-4.diff.gz
ce9a9e2384748221090a78deaaa4a57e 2091656 web extra cacti_0.8.7e-4_all.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAkwSppUACgkQynjLPm522B0A4gCdGJ2oICpnbeKXCed+zoYdMNPp
MxwAn2c5cu9g/51z0xTckkk5MkqBPwyy
=+JfS
-----END PGP SIGNATURE-----
--- End Message ---