-------------------------------------------------------------------------------- Fedora EPEL Update Notification FEDORA-EPEL-2024-17176c2215 2024-05-31 01:11:22.902644 --------------------------------------------------------------------------------
Name : cacti-spine Product : Fedora EPEL 9 Version : 1.2.27 Release : 1.el9 URL : https://cacti.net Summary : Threaded poller for Cacti written in C Description : Spine is a supplemental poller for Cacti that makes use of pthreads to achieve excellent performance. -------------------------------------------------------------------------------- Update Information: Update cacti and cacti-spine to version 1.2.27. This includes the upstream fixes for many CVEs, including a critical remote code execution bug. https://github.com/Cacti/cacti/blob/release/1.2.27/CHANGELOG https://github.com/Cacti/spine/blob/release/1.2.27/CHANGELOG -------------------------------------------------------------------------------- ChangeLog: * Wed May 22 2024 Carl George <[email protected]> - 1.2.27-1 - Update to version 1.2.27 -------------------------------------------------------------------------------- References: [ 1 ] Bug #2255603 - CVE-2023-49084 cacti: RCE when managing links [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=2255603 [ 2 ] Bug #2255607 - CVE-2023-49086 cacti: XSS when adding new devices [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=2255607 [ 3 ] Bug #2255668 - CVE-2023-49085 CVE-2023-49088 CVE-2023-50250 CVE-2023-51448 cacti: Multiple vulnerabilities [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=2255668 [ 4 ] Bug #2280481 - CVE-2024-34340 cacti: authentication bypass when using older password hashes [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=2280481 [ 5 ] Bug #2280496 - CVE-2024-29894 cacti: XSS vulnerability when using JavaScript based messaging API [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=2280496 [ 6 ] Bug #2280499 - CVE-2024-31458 CVE-2024-31459 CVE-2024-31460 cacti: multiple vulnerabilities [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=2280499 [ 7 ] Bug #2280502 - CVE-2024-31443 CVE-2024-31444 CVE-2024-31445 cacti: multiple vulnerabilties [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=2280502 [ 8 ] Bug #2280505 - CVE-2024-25641 cacti: remote code execution vulnerability [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=2280505 -------------------------------------------------------------------------------- This update can be installed with the "yum" update programs. Use su -c 'yum update cacti-spine' at the command line. For more information, refer to "YUM", available at https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7\ /html/System_Administrators_Guide/ch-yum.html All packages are signed with the Fedora EPEL GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- -- _______________________________________________ epel-package-announce mailing list -- [email protected] To unsubscribe send an email to [email protected] Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/[email protected] Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
